May 14, 2026 6 min read

Open Badge 3.0 Explained: The New Standard for Digital Credentials

CertLister OB3 settings panel showing Open Badge 3.0 configuration and keypair management

Open Badge 3.0 (OB3) is the current standard for digital credentials. If you issue digital badges, understanding OB3 — what it is, what it does, and why it matters — is increasingly important. Organizations that issue OB3-signed credentials are issuing something verifiable. Organizations that issue unsigned badges are issuing something that looks similar but can be faked.

This article explains OB3 in plain terms: how it works technically, why cryptographic signing matters, and what you need to do to issue OB3-compliant credentials.


Background: Why a Standard Was Needed

Digital badges have existed in various forms since the early 2010s. The original Open Badge standard (OB1, then OB2) was created by Mozilla and later adopted by 1EdTech (formerly IMS Global). OB2 established the basic structure of a badge: an image file with embedded JSON metadata identifying the issuer, earner, and achievement.

OB2 had a fundamental limitation: the metadata could be altered. An OB2 badge was essentially a JSON document embedded in a PNG. Anyone who modified the file to change the issuer name or earner identity could produce a plausible-looking fake. Verification depended on the issuer's hosted baking service remaining available — if the issuer's website went down, the badge couldn't be verified.

OB3, released in 2022 and reaching full adoption through 2023–2025, addresses both problems with cryptographic signing and a new data model based on the W3C Verifiable Credentials (VC) specification.


What OB3 Actually Does

OB3 restructures the credential as a Verifiable Credential — a JSON-LD document that includes a cryptographic proof.

The proof works like this:

  1. The issuing organization generates a keypair — a private key and a public key
  2. The private key is used to sign the credential document, producing a digital signature
  3. The public key is published at a known URL (usually the issuer's DID — Decentralized Identifier)
  4. The signature is embedded in the credential alongside the content

When a verifier receives the credential and wants to check its authenticity, they:

  1. Retrieve the issuer's public key from the published DID
  2. Use the public key to verify the signature
  3. If the signature is valid, the credential is authentic and unaltered

This works entirely offline once the public key is retrieved — the verifier doesn't need to contact the issuer's verification system. And because the signature is embedded in the credential itself, altering any part of the content (earner name, issue date, credential description) breaks the signature and causes verification to fail.


What This Means in Practice

For issuers: You need to configure an OB3 keypair for your organization. The keypair is used to sign every badge you issue. The private key must be kept secure — it's the root of your credential's integrity.

For earners: Your OB3 badge is self-contained proof. You can drop it into the 1EdTech OB3 validator, share it with an employer who uses an OB3-compatible reader, or submit it to any institution that accepts Verifiable Credentials — and it will verify without anyone contacting the organization that issued it.

For verifiers: You can verify an OB3 credential from the file alone. You don't need to navigate to the issuer's website, create an account, or rely on the issuer's infrastructure being available. The cryptographic proof in the file is sufficient.


OB3 vs OB2: What Changed

Open Badge 2.0Open Badge 3.0
Underlying standardMozilla/IMS JSON-LDW3C Verifiable Credentials
Cryptographic signing✗ Not supported✅ Required for compliance
Verifiable without issuer contact✗ Depends on hosted service✅ Yes, from file alone
Tamper-evident✗ Metadata can be altered✅ Alteration breaks signature
Decentralized identifiers (DID)✅ Issuer identified by did:web
W3C VC compatible
Accepted by LinkedIn verificationLimited✅ Growing support

The practical implication: OB2 badges are signed by the image's hosting service; OB3 badges are signed by the issuer's cryptographic key. The difference is that OB3 credentials survive the issuer changing their platform or going offline — the signature stays valid.


The 1EdTech Validator

1EdTech maintains a public validator for OB3 credentials at https://1edtech.org/badge/validator (search "1EdTech OB3 validator" to find the current URL). Drop a badge file into the validator and it returns:

  • Whether the cryptographic signature is valid
  • Whether the issuer's DID resolves correctly
  • Whether all required OB3 fields are present
  • Any compliance warnings

CertLister's OB3 badges pass the 1EdTech validator. When you issue a credential with OB3 enabled in CertLister, the badge file can be independently validated at any time, by anyone, using the 1EdTech tool.


How to Enable OB3 in CertLister

OB3 credential issuance is available on CertLister's Pro plan. Setup takes about 10 minutes.

Step 1: Go to Settings → Customization → Open Badge 3.0.

Step 2: Enable OB3 signing. Toggle on OB3. CertLister will generate your organization's OB3 keypair. The private key is stored securely; the public key is published at your organization's DID URL (based on your CertLister org slug).

Step 3: Configure your OB3 issuer profile. Fill in your organization name, URL, and description. This information appears in the signed credential's issuer block and is visible to any verifier who inspects the badge metadata.

Step 4: Associate badge designs with your categories. In each category where you want OB3 badges issued, ensure a badge design is assigned. When a credential is issued in that category, the OB3 badge is generated and signed automatically.

Step 5: Verify a test badge. Issue a test credential to yourself, download the badge from the recipient portal, and drop it into the 1EdTech validator to confirm the signature validates correctly.


Who Should Issue OB3 Credentials

OB3 is relevant any time credential authenticity matters to a third party.

Professional certifications. If your certifications are referenced in hiring decisions, submitted to licensing bodies, or used to demonstrate qualifications to clients, OB3 signing is the difference between a credential that proves something and one that claims something.

Compliance training. For certifications that affect whether an employee can legally perform a task (OSHA, confined space, electrical safety), the credential needs to stand up to external scrutiny. OB3-signed credentials do.

Association credentials. Professional associations issuing membership credentials, CPD points, or designation letters are increasingly expected to provide verifiable, tamper-evident credentials. OB3 is the recognized path to that.

Academic and continuing education. As employers and academic institutions adopt VC-compatible systems, OB3 credentials become the format that integrates cleanly with those systems.


The Broader Context

OB3 is part of a larger shift toward Verifiable Credentials as the standard for anything credential-like — from professional certifications to academic transcripts to government-issued IDs. The W3C VC specification that OB3 is built on is the same foundation as emerging digital identity systems.

Organizations that issue OB3 credentials today are ahead of the shift. The credentials you issue now will remain verifiable as the VC ecosystem matures — because they're built on an open, cryptographically grounded standard rather than a proprietary platform's hosted service.

Issuing OB3 isn't complicated. It's a settings change and a keypair generation. The technical complexity is handled by CertLister. What you get is credentials that are genuinely verifiable — not just aesthetically credible.

Ready to simplify credential management?

Join schools, companies, and training centers using CertLister. Free plan available, no credit card required.

Get Started Free