A structured evaluation and planning instrument for senior policymakers and executive practitioners engaged in cross-border digital identity governance across Sub-Saharan Africa. Six jurisdictions, ten DIAL criteria, five strategic dimensions.
Digital Identity
Interoperability
Assessment Framework
A structured evaluation and planning instrument for senior policymakers and executive practitioners engaged in cross-border digital identity governance across Sub-Saharan Africa.
Executive Overview & Scope
Purpose, institutional context, framework architecture, and usage guidance for senior practitioners within the ADLI 2026 cohort.
1.1 Rationale and Institutional Necessity
The emergence of Digital Public Infrastructure (DPI) as a primary instrument of economic transformation across Sub-Saharan Africa has positioned digital identity as a foundational governance priority. For the six jurisdictions represented in this cohort — Zambia, Malawi, Ghana, Nigeria, Rwanda, and Ethiopia — digital identity systems constitute not merely an administrative convenience but the structural gateway through which citizens access financial services, social protection, electoral participation, and a widening range of government functions.
Yet the full developmental potential of digital identity remains constrained by a persistent challenge: identity credentials issued within one system, institution, or jurisdiction cannot, in most cases, be recognised, verified, or acted upon by entities operating within a different system. This absence of interoperability imposes measurable costs — duplicated enrolment exercises, exclusion from cross-border services, incompatible KYC processes in financial markets, and barriers to intra-African trade — that directly undermine the objectives of the African Continental Free Trade Area (AfCFTA) and the African Union Digital Transformation Strategy 2020–2030.
This framework provides a structured, evidence-based instrument for assessing the interoperability readiness of national digital identity systems and planning iterative improvement. It is grounded in the normative criteria established by the Digital Impact Alliance (DIAL) Digital ID Assessment Guidebook (Digital Impact Alliance, 2023), supplemented by internationally recognised technical standards and regional governance frameworks.
Interoperability is not a binary condition but a spectrum of capability. No jurisdiction assessed against this framework should expect full compliance at first iteration. The framework is expressly designed for progressive, iterative improvement, with each assessment cycle establishing a revised baseline from which targeted improvements are planned and executed.
1.2 Framework Scope and Coverage
This assessment framework addresses the INTEROPERABILITY domain of the DIAL Digital ID Assessment Guidebook in comprehensive depth, while also drawing upon complementary criteria from the DATA POLICIES, MANAGEMENT PRACTICES, and PRIVACY CONTROLS domains where these bear directly upon interoperability outcomes. The framework covers ten primary assessment criteria, grouped across five strategic dimensions:
| # | Strategic Dimension | Primary Criteria | Applicability | Executive Focus |
|---|---|---|---|---|
| D-1 | Standards Compliance | INT-1, INT-A.4 | Products & Deployments | CTO, DPI Director |
| D-2 | Open Interfaces & APIs | INT-3, INT-4, INT-5 | Products & Deployments | CTO, Legal Counsel |
| D-3 | Data Portability | INT-6 | Products & Deployments | CISO, Director-General |
| D-4 | Trust Frameworks | INT-A.1, INT-A.3 | Deployed Systems Only | Minister, DG, Legal |
| D-5 | Vendor Independence | INT-2, INT-A.2 | Products & Deployments | Minister, CFO, DG |
1.3 How to Use This Framework
This instrument is structured for sequential engagement, though individual sections may be consulted independently depending on the practitioner’s specific analytical need. The recommended usage sequence is as follows:
- Familiarise with Theoretical Foundations (§2) — Establish a shared conceptual vocabulary among assessment team members before proceeding to evaluation. The theory section defines key terms, establishes the four-level interoperability typology, and grounds the framework in relevant DPI and trust architecture literature.
- Study the Assessment Criteria in Detail (§3) — Each criterion is presented with its full normative requirement (sourced directly from the DIAL Guidebook), a contextual explanation of its significance, and numbered executive assessment questions. Criteria employing the RFC 2119 MUST operator are mandatory; SHOULD criteria represent strong recommendations with contextual flexibility.
- Understand the Scoring Methodology (§4) — The four-level maturity scale, criterion weighting rationale, and aggregate score interpretation must be understood before any formal assessment is conducted.
- Complete the Self-Assessment Tool (§5) — Generate a preliminary interoperability score for your jurisdiction. This tool produces directional findings only; results must be validated through formal technical audit and stakeholder consultation.
- Review the Relevant Country Profile (§6) — Each of the six participating jurisdictions has a structured baseline profile identifying institutional context, priority interoperability dimensions, indicative gaps, and recommended first actions.
- Develop a Jurisdiction-Specific Implementation Roadmap (§7) — Adapt the phased roadmap template to your institutional context, resource constraints, and regional partnership opportunities.
- Consult the Reference List (§8) — All cited standards, frameworks, and academic sources are formally listed in compliance with Libre Baskerville citation conventions.
The DIAL Guidebook explicitly states that “this evaluation tool is intended to be used in conjunction with other evaluative approaches, as no single approach can provide a comprehensive view of a digital identity system” (Digital Impact Alliance, 2023, p. 1). This framework amplifies that caution: self-assessment findings should be treated as hypothesis-generating, not conclusive. Independent technical audits, legal reviews, and peer assessments within the ADLI cohort are essential complements to this instrument.
Theoretical Foundations
The conceptual architecture of digital identity interoperability, including the four-level model, DPI theory, trust architectures, and sovereign risk analysis.
2.1 Defining Interoperability: A Multi-Dimensional Framework
Interoperability in the context of digital identity systems denotes the capacity of a digital identity credential — issued by one system, institution, or jurisdiction — to be recognised, validated, and acted upon by a reliant party operating within a distinct system, without requiring direct communication between the original issuer and the reliant party. This definition encompasses four analytically distinct but empirically intertwined dimensions, first systematised by the European Commission’s European Interoperability Framework (European Commission, 2017) and subsequently adapted for developing country DPI contexts:
Legal
Organisational
Semantic
Technical
Table 2.1: Four-level interoperability typology. Adapted from: European Commission (2017), European Interoperability Framework — Implementation Strategy; and Gelb and Clark (2013), Identification for Development: The Biometrics Revolution, Centre for Global Development.
2.2 Digital Public Infrastructure and the Identity Layer
The Centre for Digital Public Infrastructure conceptualises DPI as shared, population-scale digital systems that, analogously to physical public infrastructure such as road networks and electricity grids, provide the foundational conditions for a broader ecosystem of services and economic activity (CDPI, 2022). Three canonical DPI layers are identified: (1) digital identity; (2) data sharing and exchange infrastructure; and (3) digital payments. The identity layer occupies a structurally privileged position: it is the gateway through which individuals are authenticated and authorised to access all higher-order DPI services.
An identity layer that lacks interoperability is not merely technically limited — it imposes cascading constraints on the entire DPI stack. Where the identity layer is siloed, the payments layer cannot rely on cross-institutional KYC; the data exchange layer cannot attribute data subjects across organisations; and the service delivery layer cannot serve citizens whose identity credentials originate from a different issuer, institution, or jurisdiction.
The DIAL Digital ID Assessment Guidebook establishes that identity solutions “MUST be able to support interoperability based on recognised standards to ensure addressability and verifiability of the presented claim” (Digital Impact Alliance, 2023, §3.6.1). The deployment of the RFC 2119 MUST operator — denoting an absolute requirement with no permissible exception — establishes standards-based interoperability not as an aspirational feature but as a non-negotiable baseline for any identity system intended to function within a modern DPI ecosystem.
2.3 The Trust Triangle and Disintermediation Principle
The canonical trust architecture of a digital identity system comprises three roles: the Issuer (the authority that issues credentials); the Holder (the individual who holds and presents credentials); and the Reliant Party (the entity that accepts and acts upon credential presentations). The DIAL Guidebook — drawing upon the definitions of NIST Special Publication 800-63-4 — provides formal definitions for each role (Digital Impact Alliance, 2023, Glossary).
For interoperability to function without creating surveillance or privacy risks, the trust triangle must operate without requiring direct communication between the Issuer and the Reliant Party at the time of each transaction. The DIAL Guidebook expresses this as a dual requirement: first, that “the system MUST support a Subject being able to present claims issued to them without the risk of disintermediation” (INTEROPERABILITY criterion, PRIVACY-5); and second, that “the system MUST support verification of claims by the Issuer without the risk of disintermediation” (PRIVACY-6). Cryptographic mechanisms — including digital signatures, zero-knowledge proofs, and revocation registries that do not reveal subject identity — are the technical instruments through which these requirements are satisfied (Digital Impact Alliance, 2023, §§3.10.5–3.10.6).
2.4 Vendor Lock-in as a Sovereignty Risk
For national governments, vendor lock-in in digital identity systems represents a sovereignty risk that is simultaneously technical, fiscal, and political. The DIAL Guidebook explicitly recognises that “vendor lock-in puts those who are using the system at the mercy of the vendor. Vendors may drastically increase prices once the switching costs become too high. They may stop offering the necessary services or cease to exist” (Digital Impact Alliance, 2023, §3.6.8).
For the six cohort countries, this risk is amplified by three structural factors common to public technology procurement in the region: first, the prevalence of long-term sole-source contracts with limited competitive re-tendering; second, insufficient domestic technical capacity to operate, maintain, or migrate complex identity systems; and third, inadequate documentation of system architecture, data schemas, and operational procedures by incumbent vendors. The DIAL Guidebook prescribes a comprehensive mitigation approach: vendor lock-in must be addressed not only at the level of technology products but also “for the running and operating of the identity system and all the associated legal agreements. Open-source technologies can help. Local and diverse bases of expertise should be nurtured” (Digital Impact Alliance, 2023, §3.6.8).
Interoperability Assessment Criteria
All ten DIAL interoperability criteria, presented with full normative requirements, contextual significance, and numbered executive assessment questions.
MUST — Absolute requirement; no permissible deviation (RFC 2119). MUST NOT — Absolute prohibition. SHOULD — Strong recommendation; deviation requires documented justification. Criteria coded with standard numbers (e.g., INT-1 through INT-6) apply to both identity products under procurement and deployed systems. Criteria suffixed with -A (e.g., INT-A.1) apply exclusively to deployed operational systems.
D-1: Standards Compliance
Standards are the infrastructure upon which all interoperability is constructed. A digital identity system that does not implement internationally recognised, open standards becomes a technical silo: capable of data exchange only within its own ecosystem, and unable to participate in cross-institutional, cross-border, or cross-sector identity verification without bespoke, bilateral integration arrangements. The DIAL Guidebook observes that without standards, “the identity solution basically becomes a silo, only able to exchange information within its own walled-off garden. This leads to vendor lock-in, meaning the Holder has limited control over how this identity information can be used” (Digital Impact Alliance, 2023, §3.6.1). For governments pursuing AfCFTA integration and regional DPI harmonisation, non-compliance with this criterion is not a technical gap but a strategic failure.
D-1 · Standards — Executive Assessment Questions- Which internationally recognised standards does the identity system implement for credential format, biometric encoding, authentication protocol, and data exchange? (Relevant standards include, inter alia: W3C Verifiable Credentials Data Model v1.1; ISO/IEC 18013-5 for mobile driving licences and identity credentials; ISO/IEC 19794 for biometric data interchange; FIDO2/WebAuthn for authentication; and OpenID Connect 4 Verifiable Presentations for credential presentation.)
- How do the implemented standards support addressability — the ability to uniquely locate and reference a presented identity claim from any participating reliant party?
- How do the implemented standards support verifiability — the ability to cryptographically confirm that a presented claim has not been tampered with since issuance, and that it was issued by a legitimately trusted authority?
- Has the jurisdiction conducted a formal standards gap analysis against the above-referenced international benchmarks, and has this analysis been documented and published?
- Are standards requirements formally embedded in procurement specifications, contractual performance obligations with vendors, and system acceptance criteria?
- What process exists for evaluating and adopting new or revised standards as the global identity technology landscape evolves?
The DIAL Guidebook defines the identity lifecycle as comprising five stages: identity proofing; issuance; authentication; authorisation; and identity management (including recovery) (Digital Impact Alliance, 2023, Glossary). This criterion extends standards compliance beyond the credential format layer — which may achieve headline compliance with W3C or ISO standards — to require that every component across all five stages implements recognised standards. A system that issues W3C Verifiable Credentials but performs biometric enrolment using proprietary encoding, authenticates using a proprietary protocol, and manages recovery through an undocumented vendor-specific process, achieves only partial lifecycle interoperability. Full lifecycle standards compliance is the condition under which maximum interoperability is achievable.
D-1 · Lifecycle Standards — Executive Assessment Questions- Has a complete lifecycle architecture document been produced that maps each system component — proofing, issuance, authentication, authorisation, recovery — to a specific recognised standard?
- Are there lifecycle stages where proprietary or non-standard components are deployed? If so, what documented justification exists, and what is the remediation plan?
- How does the system facilitate data portability across the lifecycle — specifically, can a Holder extract their complete identity data in a standards-based format from any point in the lifecycle?
- Are lifecycle components independently interchangeable — that is, can one component (e.g., the authentication layer) be replaced by an alternative compliant component without disrupting the remainder of the system?
D-2: Open Interfaces and APIs
Application Programming Interfaces (APIs) are the technical mechanism through which identity systems integrate with external services: government ministries, financial institutions, healthcare providers, border control agencies, and cross-border reliant parties. The MUST designation establishes open APIs as a non-negotiable baseline. The DIAL Guidebook specifies that “API definitions should be published publicly, meaning that anyone who wants to read the API documentation can without restriction” (Digital Impact Alliance, 2023, §3.6.3), establishing a principle of documentation transparency that eliminates the practical lock-in that arises when API access is controlled by the vendor through registration requirements, commercial licensing, or technical obscurity. With open APIs, “those deploying the system can expand and/or update the use of the identity system as the needs evolve, as well as add/replace components of the identity system that may not be provided by the original vendor” (Digital Impact Alliance, 2023, §3.6.3).
D-2 · Open APIs — Executive Assessment Questions- Are all API specifications for the national identity system publicly documented and freely accessible without registration, commercial licensing, or vendor approval?
- Does a developer sandbox and portal exist, enabling potential reliant parties to test integrations before operational deployment?
- What restrictions, if any, are placed on API access? Are such restrictions legally justified, proportionate to stated security objectives, and individually documented?
- Do the available APIs cover all stages of the identity lifecycle for which reliant party integration is required?
- What security controls govern API access — specifically, how are reliant parties authenticated, how are API requests authorised, and how are rate limits and abuse controls implemented?
- How are API versioning, backward compatibility, and deprecation timelines managed to protect reliant party integrations from disruption?
- What onboarding process exists for reliant parties seeking API access, and does this process introduce barriers inconsistent with the open API principle?
Data portability APIs serve two legally and operationally distinct purposes: they protect governments’ right to migrate between identity system vendors without data loss, and they protect citizens’ rights to access, extract, and — where legally applicable — delete their identity data. Both purposes are constitutive of a functioning DPI governance regime. The DIAL Guidebook observes that without portability APIs, “there is vendor lock-in which limits the ability of the Holder to exercise control over the data” (Digital Impact Alliance, 2023, §3.6.4). For national governments, this translates to a loss of sovereign control over foundational national infrastructure: a state locked into a vendor ecosystem due to absent portability mechanisms cannot exercise meaningful procurement authority, cannot respond to vendor service failure, and cannot migrate to superior technological solutions as they become available.
D-2 · Portability APIs — Executive Assessment Questions- Do portability APIs exist for all system components, including biometric enrolment data, credential registries, consent records, event logs, and audit trails?
- In what format is extracted data structured? Is this format based on a recognised international standard — specifically, one that can be ingested by alternative identity system platforms?
- Has the government conducted a controlled data migration exercise to validate that portability APIs function as specified in an operationally realistic scenario?
- Are portability rights, including the data format specifications and associated Service Level Obligations, contractually guaranteed in all vendor agreements?
- What authentication and authorisation mechanisms govern portability API access, ensuring that mass data extraction is prevented except by authorised parties?
- Has independent legal counsel confirmed that portability API provisions in current vendor contracts are enforceable under applicable law?
This criterion identifies a sophisticated and frequently overlooked form of vendor lock-in: the use of intellectual property instruments — patents, trade secrets, or contractual non-compete clauses — to prevent competing vendors or government technical teams from implementing systems that share the same API interface specification. Such legal encumbrances may not be visible in the technical specification of the API itself, but may be embedded in software licencing terms, vendor contracts, or proprietary technology disclosures. Their effect is to create a monopoly over the integration ecosystem even when the technical interface is nominally published. The DIAL Guidebook specifies that “the vendor needs to allow for reuse of their published API interfaces. In other words, they must not pursue actions, including legal, to prevent other organisations/developers from creating services that utilise the same API interfaces” (Digital Impact Alliance, 2023, §3.6.5). This criterion requires legal scrutiny as a complement to technical review.
D-2 · Interface Encumbrances — Executive Assessment Questions- Have vendor contracts been reviewed by legal counsel specifically for provisions that restrict the government’s ability to commission alternative implementations of the API interface?
- Does the vendor assert intellectual property rights over the API interface specification — as distinct from the implementation — that would prevent third-party reimplementation?
- Are API interface specifications published under an open licence (e.g., Creative Commons, Apache 2.0) that explicitly permits reimplementation by third parties?
- Does the government maintain a registry of all proprietary claims made by identity system vendors over interface specifications, protocols, and data schemas?
D-3: Data Portability and Export
Machine-readable data export is the operational realisation of the data portability principle. The DIAL Guidebook specifies that exports should follow “recognised standards for syntax and semantics” and should “endeavour to support structuring the identity data such that it can be imported into other solutions, where possible” (Digital Impact Alliance, 2023, §3.6.6). This requirement has direct implications for national data sovereignty: a government that cannot extract its citizens’ identity data in a standards-based, system-agnostic format is functionally dependent on its vendor for the continued operation of foundational national infrastructure. Where this dependency exists, it translates into leverage that vendors may exploit — consciously or otherwise — during contract renegotiations, service pricing discussions, or dispute resolution proceedings.
D-3 · Data Export — Executive Assessment Questions- What data export formats are supported? Are these formats based on recognised open standards — specifically, formats that can be ingested by at least two alternative, commercially available identity system platforms?
- Does the data export cover the complete identity data record — all attributes, associated metadata, consent records, and audit history — or only a subset?
- Can data exports function as operational backups — that is, can the complete identity system be restored from an export in a documented, tested recovery procedure?
- Is there any functional loss when data is exported and imported into an alternative platform? If so, what functionality is lost, and what is the remediation plan?
- What security controls govern the export function, ensuring that bulk identity data extraction occurs only under authorised conditions?
D-4: Trust Frameworks and Governance
Trust and governance frameworks are the non-technical dimension of interoperability that govern the rules of engagement between participants in an identity ecosystem. The DIAL Guidebook observes that “identity cannot be solved with technology-only solutions, and trust/governance frameworks pick up where the technology leaves off” (Digital Impact Alliance, 2023, §3.6.7). For the six cohort countries, the relevant frameworks include — at the regional level — the EAC Digital Integration Programme, the SADC Protocol on Trade in Services, the ECOWAS biometric identity framework, and the IGAD Regional Migration Policy Framework; and — at the continental level — the African Union Data Policy Framework (African Union, 2022) and the AfCFTA Protocol on Digital Trade. A deployed identity system that cannot technically participate in these frameworks — because it lacks the governance metadata, trust registry integration capability, or cryptographic interoperability required — is effectively excluded from the regional DPI ecosystem regardless of its domestic functionality.
D-4 · Trust Frameworks — Executive Assessment Questions- Is the national identity system designed — from an architectural standpoint — to participate in external trust frameworks, or is it structurally closed to such participation?
- What governance model is envisaged for any trust framework in which the jurisdiction intends to participate — bilateral, multilateral, regional body-anchored, or industry-led?
- How are access rights codified within the trust framework? Specifically: who may issue credentials recognised by the framework; who may act as a reliant party; and under what conditions is cross-border credential presentation permitted?
- What consensus mechanism governs amendments to trust framework rules, and how is the jurisdiction’s institutional voice represented in framework governance?
- What dispute resolution mechanisms exist when trust framework rules are violated — by an issuer issuing fraudulent credentials, by a reliant party exceeding its authorised data use, or by the trust framework operator itself?
- How does the jurisdiction’s existing legal framework — encompassing data protection legislation, electronic transactions law, and identity law — interact with trust framework obligations, and where are the principal legal tensions?
The DIAL Guidebook illustrates the purpose of this criterion through the example of a medical trust framework: a pharmacy must be able to verify that a credential-issuing physician is licensed, and a patient must be able to verify that the pharmacy is legitimate — both without requiring direct contact with the relevant licensing authority for each individual transaction (Digital Impact Alliance, 2023, §3.6.9). Equivalent mechanisms are required at national level: a government service must be able to confirm that a presented credential was issued by an authorised, registered issuer without creating a “phone home” request that reveals to the issuer who is verifying which credential, at what time, and for what purpose. Absent such automated validation mechanisms, trust framework participation degenerates into a series of manual, bilateral verification calls that do not scale to population-level digital service delivery.
D-4 · Trust Validation — Executive Assessment Questions- Does the trust framework include a cryptographically verifiable issuer registry that enables reliant parties to confirm issuer legitimacy without contacting the issuer at transaction time?
- Does the trust framework include a mechanism for holders to validate the legitimacy of reliant parties making credential presentation requests?
- Are validation mechanisms implemented within the identity system software itself, enabling automated validation without manual look-up processes?
- How are trust framework validation mechanisms operated in offline scenarios — specifically, in geographic areas with limited or intermittent network connectivity?
D-5: Vendor Independence
Open-source software adoption in national identity systems serves multiple simultaneous strategic objectives: reducing vendor lock-in risk by enabling the government to operate, maintain, and modify the system with any qualified technical team; enabling peer review of the codebase by a broader technical community; facilitating knowledge transfer to domestic technical talent; and permitting adaptation and extension of the system without proprietary licensing constraints. The DIAL Guidebook recognises that open-source adoption may not always be fully achievable — “systems may be a collection of both open- and closed-source software” — but establishes that “open-source software provides several advantages, including limiting vendor lock-in and the possibility of a wider code review” (Digital Impact Alliance, 2023, §3.6.2). For the cohort countries, the MOSIP (Modular Open Source Identity Platform) adoption by Malawi and Ethiopia represents a concrete application of this principle.
D-5 · Open Source — Executive Assessment Questions- What proportion, by functional component, of the current identity system is implemented using open-source software? Is this proportion formally documented?
- What identity functions are handled by open-source components, and which are handled by proprietary software?
- Are open-source licences used by the system (e.g., MIT, Apache 2.0, MPL) compatible with government use, modification, and procurement of maintenance services from alternative vendors?
- Does the jurisdiction have resident technical capacity — within government or in the domestic private sector — sufficient to maintain and modify open-source components without dependence on the original implementing vendor?
- Has the government contributed to the open-source communities from whose work it benefits — through code contributions, bug reports, or financial support — consistent with sustainable open-source governance principles?
Vendor lock-in in deployed identity systems is a multi-layered risk, operating simultaneously at the technical, contractual, financial, and capability levels. At the technical level, proprietary data formats, closed APIs, and undocumented system architecture prevent migration. At the contractual level, long-term exclusive agreements, termination penalties, and inadequate source code escrow provisions constrain sovereign decision-making. At the financial level, high switching costs create de facto monopoly leverage for incumbent vendors during contract renewals. At the capability level, insufficient domestic technical expertise creates dependency even when technical and contractual barriers have been formally addressed. The DIAL Guidebook prescribes a comprehensive response: open-source technologies, local capacity building, and careful legal agreement design must all be pursued in parallel (Digital Impact Alliance, 2023, §3.6.8).
D-5 · Vendor Lock-in — Executive Assessment Questions- What contractual mechanisms exist to protect the government’s right to migrate to an alternative vendor? Specifically: are source code escrow arrangements in place; is the escrow independently verified; and under what conditions is escrow release triggered?
- Has the jurisdiction invested in domestic technical capacity — within government or the domestic private sector — sufficient to operate and modify the identity system independently of the original implementing vendor?
- What is the estimated total cost of switching to an alternative vendor for each major system component? Has this been formally quantified as part of a vendor independence risk assessment?
- Are open-source alternatives to current proprietary components formally documented and evaluated in the jurisdiction’s technology roadmap?
- Are legal agreements with identity system vendors reviewed by counsel with specific expertise in technology procurement and DPI governance, rather than general commercial law?
Maturity Scale and Scoring Methodology
Four-level maturity scale with explicit transition conditions, criterion weighting rationale, and aggregate score interpretation guidance.
4.1 Four-Level Maturity Scale
Each criterion is assessed against a four-level maturity scale. The scale is designed for iterative use: each level has an explicit, observable definition, and the conditions for progression from one level to the next are stated with sufficient specificity to enable verifiable tracking of improvement over successive assessment cycles. The normative basis for the maturity structure is the DIAL Guidebook’s explicit requirement that the assessment tool be used for “benchmarking” and “comparing the change in a single solution over time” (Digital Impact Alliance, 2023, p. 1).
4.2 Criterion Weighting and Scoring Matrix
Criteria are weighted by two factors: their normative designation in the DIAL Guidebook (MUST criteria receive higher weights than SHOULD criteria, reflecting their absolute compliance requirement), and their strategic importance to the cross-border interoperability objectives of the ADLI 2026 cohort, as determined through programme advisory consultation.
| Code | Criterion Name | Norm | Weight | Domain | Weighting Rationale |
|---|---|---|---|---|---|
| INT-1 | Recognised Standards | MUST | 15% | D-1 | Foundational — no interoperability is structurally possible without standards alignment |
| INT-A.4 | Lifecycle Standards | SHOULD | — | D-1 | Subsumed as supplementary indicator within INT-1; scored as lifecycle extension |
| INT-3 | Open APIs (Integration) | MUST | 15% | D-2 | Direct enabler of ecosystem integration; without open APIs, interoperability is manual and unscalable |
| INT-4 | Open APIs (Portability) | MUST | 12% | D-2 | Critical for vendor sovereignty and citizen data rights; absent portability creates structural dependency |
| INT-5 | No Interface Encumbrances | MUST NOT | 10% | D-2 | Legal risk dimension; encumbrances may silently neutralise all technical interoperability achievements |
| INT-6 | Machine-Readable Export | MUST | 12% | D-3 | Operationalises portability; without export capability, vendor independence is structurally unachievable |
| INT-A.1 | Trust Framework Participation | MUST | 14% | D-4 | Governance layer; deployed systems require trust framework capability for cross-border credential use |
| INT-A.3 | Trust Framework Validation | SHOULD | 6% | D-4 | Operational mechanism; enables automated verification at population scale |
| INT-2 | Open-Source Software | SHOULD | 8% | D-5 | Sustainability and independence; lower weight reflects SHOULD designation and contextual complexity |
| INT-A.2 | Avoid Vendor Lock-in | SHOULD | 8% | D-5 | Strategic risk; lower weight reflects SHOULD designation but remains a high-priority concern |
| Total | — | 100% | — |
4.3 Aggregate Score Interpretation
| Score Range | Classification | Interpretation | Recommended Immediate Action |
|---|---|---|---|
| 85–100 | Advanced | Advanced interoperability readiness demonstrated. Cross-border credential recognition is operationally feasible with willing partners. | Pursue bilateral or multilateral trust framework formalisation; document and share methodology as regional reference model. |
| 65–84 | Proficient | Strong technical and governance foundations. Specific identified gaps remain in one or two dimensions. | Targeted remediation of lowest-scoring MUST criteria; initiate trust framework design process with at least one regional partner. |
| 40–64 | Developing | Material progress evident but significant technical, legal, or governance gaps constrain interoperability potential. | Comprehensive improvement programme; prioritise all MUST criteria before advancing to governance work. |
| 0–39 | Foundation | Foundational requirements unmet. Cross-border interoperability is not currently feasible. | Immediate technical assistance engagement; foundational standards adoption and API programme required before governance. |
Preliminary Self-Assessment Calculator
An interactive preliminary scoring instrument for executive use. Produces directional findings; formal audit is required for definitive assessment.
This tool generates a preliminary, high-level indication of interoperability maturity based on self-reported assessments. It is not a substitute for a formal, evidence-based technical audit or independent third-party assessment. All scores produced by this tool should be treated as directional hypotheses requiring validation through documentary evidence, technical testing, and peer review within the ADLI cohort.
ADLI Participant Country Profiles
Structured baseline assessments for each participating jurisdiction, covering institutional context, priority interoperability dimensions, indicative gap analysis, and recommended priority actions.
The profiles presented in this section are structured analytical frameworks informed by publicly available institutional documentation, including national digital economy strategies, identity authority reports, and published DPI frameworks. They are not the product of completed formal assessments and should not be interpreted as definitive evaluations. Each jurisdiction should use this profile as a structured starting template for its own evidence-gathering, stakeholder consultation, and verification process.
Institutional Context
Zambia administers identity through the NRPA, issuing the National Registration Card (NRC) as the primary legal identity document. The Smart Zambia Institute, established in 2017, coordinates digital government transformation. The National Identification System (NIS) project has sought to integrate biometric verification across government services. Zambia’s dual membership of SADC and COMESA creates overlapping regional interoperability obligations and significant opportunities for cross-border credential harmonisation — particularly in the context of the SADC Industrialisation Strategy 2015–2063 and COMESA’s digital integration agenda.
Indicative Dimension Scores
Priority Dimensions
- SADC e-ID harmonisation and cross-border credential architecture
- Financial inclusion — mobile money KYC interoperability
- COMESA Single Window identity verification integration
- Vendor independence risk assessment and escrow negotiation
| Criterion | Indicative Status | Principal Gap | Recommended Priority Action |
|---|---|---|---|
| INT-1: Standards | Developing | NIS uses proprietary biometric formats; limited W3C/ISO alignment | Adopt ISO/IEC 18013-5 for mobile credentials; publish standards roadmap |
| INT-3: Open APIs | Foundation | No public API documentation; NIS data access is restricted and undocumented | Publish API documentation; establish financial sector developer sandbox |
| INT-A.1: Trust Framework | Foundation | No formal trust framework architecture; SADC engagement at policy level only | Join SADC Digital ID Trust Framework Working Group; commission feasibility study |
| INT-A.2: Vendor Independence | Developing | Smart card system supplied by single vendor with no documented escrow | Commission vendor lock-in risk assessment; negotiate source code escrow |
Institutional Context
Malawi’s National Registration Bureau administers the Malawi National ID (MNID) on the MOSIP platform — an open-source foundation that confers significant interoperability and vendor independence advantages compared to proprietary alternatives. MOSIP implements internationally recognised credential standards and provides a publicly documented API ecosystem. Malawi’s adoption of MOSIP positions it as a potential reference implementation for SADC interoperability, and creates natural connectivity with the global MOSIP implementation network, which includes Ethiopia, Morocco, Sri Lanka, and the Philippines, among others.
Indicative Dimension Scores
Priority Dimensions
- Maximising MOSIP’s standards architecture for SADC cross-border recognition
- Social protection programme integration and beneficiary deduplication
- Financial inclusion — formal financial sector KYC harmonisation
- Cross-border trust framework pilot with Zambia under SADC auspices
| Criterion | Indicative Status | Principal Gap | Recommended Priority Action |
|---|---|---|---|
| INT-1: Standards | Proficient | MOSIP implements W3C VC standards; ISO/IEC 18013-5 alignment is partial | Complete ISO/IEC 18013-5 compliance assessment; document full standards inventory |
| INT-2: Open Source | Advanced | MOSIP is fully open-source; domestic capacity to maintain remains limited | Invest in domestic MOSIP developer capacity; consider upstream contributions |
| INT-A.2: Vendor Independence | Advanced | MOSIP architecture reduces lock-in; system integrator dependencies remain | Ensure system integrator contracts include full source documentation obligations |
| INT-A.1: Trust Framework | Developing | No operational trust framework for cross-border MNID credential use | Leverage MOSIP network’s interoperability work for SADC trust framework design |
Institutional Context
Ghana’s NIA administers the Ghana Card, recognised as one of West Africa’s most advanced national identity programmes, with enrolment exceeding 17 million citizens. The Ghana Card is ICAO-compliant and integrates with the National Health Insurance Scheme (NHIS), the financial sector through Bank of Ghana KYC regulations, and electoral processes through the Electoral Commission. Ghana’s aspiration to serve as a DPI reference implementation within ECOWAS positions interoperability leadership as both a technical priority and a diplomatic asset.
Indicative Dimension Scores
Priority Dimensions
- ECOWAS biometric identity framework — cross-border credential recognition
- GhIPSS financial sector interoperability integration
- Ghana.gov digital services portal — multi-service credential use
- W3C Verifiable Credentials layer for online verification without card present
| Criterion | Indicative Status | Principal Gap | Recommended Priority Action |
|---|---|---|---|
| INT-1: Standards | Proficient | ICAO standards for card; W3C VC digital credential layer absent | Develop W3C VC-compliant digital credential layer for online verification |
| INT-3: Open APIs | Developing | NIA Verify API exists; documentation incomplete; financial sector access privileged | Publish comprehensive public API documentation; eliminate access asymmetries |
| INT-A.1: Trust Framework | Developing | ECOWAS framework at policy level; technical implementation lags significantly | Champion ECOWAS technical working group for biometric interoperability standards |
| INT-5: No Encumbrances | Developing | Interface encumbrance analysis of vendor contracts not publicly documented | Commission independent legal review of NIA vendor contracts for API provisions |
Institutional Context
Nigeria administers the National Identification Number (NIN) through NIMC, with enrolment exceeding 100 million as of 2023 — making it Sub-Saharan Africa’s largest identity programme by enrolment volume. The NIN is mandatory for SIM card registration, bank account operations, and an expanding range of government services. Nigeria’s complex multi-layered identity ecosystem — comprising NIMC, the Independent National Electoral Commission (INEC), the Corporate Affairs Commission (CAC), and over 28 sector-specific registries — presents significant internal interoperability challenges that are a prerequisite for any credible cross-border interoperability ambition. The enactment of the Nigeria Data Protection Act 2023 provides an improved legal foundation for data governance, though implementation capacity remains a challenge.
Indicative Dimension Scores
Priority Dimensions
- Internal harmonisation — NIN integration across 28+ sector registries
- ECOWAS cross-border facilitation — diaspora identity and remittance KYC
- eNaira digital currency — identity foundation for CBDC interoperability
- National Digital Identity Standards Framework development
| Criterion | Indicative Status | Principal Gap | Recommended Priority Action |
|---|---|---|---|
| INT-1: Standards | Developing | Multiple legacy standards across fragmented ecosystem; limited W3C/ISO alignment | Develop National Digital Identity Standards Framework to harmonise across all registries |
| INT-3: Open APIs | Developing | NIMC Verify API commercially licensed; not truly open; access barriers significant | Transition to fully public API model; remove commercial barriers for public service delivery |
| INT-A.2: Vendor Independence | Foundation | Core NIMC system on long-term proprietary contract; escrow provisions unclear | Commission vendor independence audit; mandate source code escrow in all new procurements |
| INT-A.1: Trust Framework | Developing | Federated identity concept exists; governance model significantly underdeveloped | Establish National Digital Identity Governance Framework with clear trust hierarchy |
Institutional Context
Rwanda is widely recognised as Sub-Saharan Africa’s most mature DPI environment, with the Irembo government service delivery platform, Rwanda National ID, and the Rwanda National Payment System forming a deeply integrated DPI stack. Rwanda’s National Digital Policy and Strategic Plan 2022–2028 positions digital identity as a core enabler of Vision 2050 economic transformation goals. Rwanda’s EAC membership and its emerging role as a DPI reference implementation create both domestic and regional leadership opportunities — particularly as EAC member states seek to develop cross-border digital trade facilitation infrastructure under the EAC Digital Integration Programme.
Indicative Dimension Scores
Priority Dimensions
- EAC Single Customs Territory — cross-border identity for trade facilitation
- Lead EAC Digital ID Trust Framework development as reference implementer
- Verifiable Credentials layer for academic and professional credential recognition
- Cross-border validation protocol for EAC partner testing
| Criterion | Indicative Status | Principal Gap | Recommended Priority Action |
|---|---|---|---|
| INT-1: Standards | Proficient | Strong domestic standards compliance; EAC-level harmonisation incomplete | Champion EAC Digital Identity Standards Working Group; share Rwanda documentation |
| INT-3: Open APIs | Proficient | Irembo APIs well-documented; NIDA cross-border API specifications underdeveloped | Develop cross-border API specifications under EAC Digital Integration Programme |
| INT-A.1: Trust Framework | Proficient | Domestic trust architecture is mature; EAC multilateral framework nascent | Lead EAC Digital ID Trust Framework development, leveraging NIDA architecture |
| INT-A.3: Validation Mechanism | Advanced | Domestic validation automated; cross-border validation is manual | Develop cryptographic cross-border credential validation protocol for EAC partner testing |
Institutional Context
Ethiopia launched Fayda, its national digital ID system, in 2021, built on the MOSIP open-source platform. With a population exceeding 120 million, Ethiopia represents the globally largest-scale MOSIP deployment, making its implementation decisions consequential for the broader MOSIP ecosystem. The Digital ID Proclamation No. 1284/2023 provides the legal foundation for Fayda, though the complementary Personal Data Protection Proclamation remains under development — a gap with direct implications for cross-border data sharing under trust framework arrangements. Ethiopia’s IGAD membership and application to join the EAC create significant regional interoperability obligations and opportunities, particularly for Horn of Africa cross-border movement facilitation and trade.
Indicative Dimension Scores
Priority Dimensions
- IGAD regional digital ID interoperability for Horn of Africa movement
- Fayda W3C Verifiable Credentials layer for cross-border digital use
- Financial inclusion at scale — Telebirr mobile money integration with Fayda
- Data protection legislation — prerequisite for trust framework participation
| Criterion | Indicative Status | Principal Gap | Recommended Priority Action |
|---|---|---|---|
| INT-1: Standards | Proficient | MOSIP standards compliance strong; Fayda credential format not yet W3C VC-compliant | Implement W3C Verifiable Credentials layer on Fayda for cross-border digital use |
| INT-2: Open Source | Advanced | MOSIP foundation excellent; system integrator layer introduces proprietary components | Document integrator proprietary components; develop open-source alternatives roadmap |
| INT-A.1: Trust Framework | Foundation | No operational IGAD regional digital ID trust framework; data protection law incomplete | Enact Data Protection Proclamation; initiate IGAD DID Trust Framework feasibility study |
| INT-3: Open APIs | Developing | MOSIP APIs open; Fayda-level public API documentation for financial sector limited | Publish Fayda API documentation; establish financial sector reliant party onboarding |
Phased Implementation Roadmap
A four-phase, iterative improvement framework for executive planning, with numbered action items, expected outputs, and cohort collaboration milestones.
This roadmap is designed for iteration and adaptation. The DIAL Guidebook’s note that no single evaluation approach is sufficient applies equally to improvement: interoperability is not a destination but a continuous process of standards adoption, governance evolution, capacity building, and relationship development. Each assessment cycle should produce a revised implementation plan, with milestones recalibrated against the updated interoperability score.
Diagnostic and Baseline Establishment
Objective: Establish a verified, evidence-based interoperability baseline score across all nine weighted criteria, validated through documentary evidence and stakeholder consultation.
- Constitute an inter-agency Technical Interoperability Assessment Team (TIAT) comprising representatives from the national identity authority, the digital government directorate, legal counsel, finance, and a nominated civil society observer.
- Complete the self-assessment tool (§5) as a first-pass hypothesis, with all selections requiring citation of specific documentary evidence.
- Commission an independent technical audit of standards compliance (INT-1, INT-A.4) and API openness (INT-3) using the DIAL Guidebook criteria as the audit standard of reference.
- Engage specialist legal counsel to conduct a vendor contract review targeting API encumbrance provisions (INT-5), portability guarantees (INT-4), source code escrow arrangements (INT-A.2), and any intellectual property claims over interface specifications.
- Map the complete identity lifecycle against standards compliance using the structure in §3 (D-1), documenting components that use proprietary versus recognised open standards.
- Produce a formal Interoperability Baseline Report, to be shared within the ADLI cohort for peer review and comparison at the Month 3 cohort convening.
Foundation Strengthening — MUST Criteria Priority
Objective: Achieve Level 3 compliance on all five MUST criteria (INT-1, INT-3, INT-4, INT-5, INT-6, INT-A.1) before advancing to governance and partnership work.
- Develop and formally publish a National Digital Identity Standards Declaration, specifying the jurisdiction’s adopted standards for credential format, biometric encoding, authentication protocol, and data export — with associated implementation timelines and vendor compliance requirements.
- Publish complete, publicly accessible API documentation for the national identity system, including: API reference documentation; OpenAPI specification files; integration guides; and a functioning developer sandbox environment.
- Renegotiate or formally amend vendor contracts to: (a) guarantee data portability with specified open-standard export formats and defined SLAs; (b) eliminate any API interface encumbrances or intellectual property restrictions; and (c) establish independently verified source code escrow arrangements.
- Conduct a controlled, documented data migration exercise to demonstrate that portability APIs (INT-4) and data export functions (INT-6) operate correctly in a realistic migration scenario — including a record of what data was successfully migrated and what was not.
- Commission a trust framework architecture design study, with engagement from the relevant regional body (EAC, SADC, ECOWAS, or IGAD), producing a technical architecture proposal for cross-border credential recognition.
- Identify and formally engage a bilateral partner jurisdiction from the ADLI cohort for a Phase 3 trust framework pilot, establishing a working group with defined governance and decision-making procedures.
Interoperability Architecture Build and Bilateral Pilot
Objective: Implement a functional W3C Verifiable Credentials-compliant credential layer; establish and test a bilateral trust framework pilot with one ADLI cohort partner; achieve Level 3 on all SHOULD criteria.
- Implement a W3C Verifiable Credentials-compliant digital credential layer, enabling cryptographically verifiable presentation of national identity credentials by holders to reliant parties, without requiring issuer contact at transaction time.
- Establish a formal bilateral trust framework with one partner jurisdiction, codifying in a signed governance agreement: the issuer trust registry and technical format; reliant party registration and vetting procedures; identity assurance level mapping between the two systems; liability allocation; and dispute resolution procedures.
- Deploy trust framework validation mechanisms (INT-A.3) enabling automated, cryptographic verification of credential authenticity and issuer legitimacy within the bilateral framework, including an offline-capable validation mode.
- Achieve Level 3 on open-source adoption (INT-2) through a documented open-source policy, publicly available source code for government-developed components, and a demonstrable investment in domestic technical capacity.
- Publish an annual Interoperability Progress Report against this framework, establishing a public accountability mechanism and documenting lessons learned for the ADLI programme.
- Present pilot results and lessons learned at the Month 30 cohort convening, enabling other jurisdictions to adapt the bilateral model for their own partnerships.
Regional Scale and Continuous Optimisation
Objective: Achieve Level 4 on all MUST criteria; expand to multilateral regional trust framework; demonstrate measurable social and economic outcomes; contribute to global DPI knowledge commons.
- Expand bilateral trust framework to multilateral architecture, encompassing all willing ADLI cohort members and seeking formal endorsement from the relevant regional body (EAC, SADC, ECOWAS, or IGAD, as applicable).
- Commission an independent formal assessment against this framework — conducted by an external evaluator with relevant DPI expertise — and publish results publicly.
- Demonstrate measurable social and economic outcomes of identity interoperability through a formal evaluation, including: cross-border transaction volumes using verified digital credentials; financial inclusion metrics for previously excluded populations; and processing time reductions at border crossing points.
- Achieve full vendor independence through demonstrated domestic technical capacity sufficient to operate, modify, and — if required — migrate the national identity system without dependence on the original implementing vendor.
- Publish the jurisdiction’s interoperability architecture, trust framework governance model, and implementation lessons as open documentation, contributed to the global DPI knowledge commons for adaptation by other developing country practitioners.
- Initiate a second full assessment cycle against this framework, establishing a revised baseline and a new four-year improvement programme.
7.2 ADLI Cohort Peer Learning Structure
| # | Cohort Activity | Timing | Jurisdictions | Expected Output |
|---|---|---|---|---|
| 1 | Baseline score sharing and peer review | Month 3 | All six | Comparative interoperability gap analysis |
| 2 | Standards harmonisation working session | Month 6 | All six | Draft shared standards declaration |
| 3 | SADC bilateral trust framework pilot | Month 18 | Zambia · Malawi | SADC bilateral trust framework prototype |
| 4 | EAC bilateral trust framework pilot | Month 18 | Rwanda · Ethiopia | EAC bilateral trust framework prototype |
| 5 | ECOWAS trust framework design | Month 18 | Ghana · Nigeria | ECOWAS interoperability architecture proposal |
| 6 | Phase 3 results convening | Month 30 | All six | Lessons learned documentation; cross-corridor learning |
| 7 | Full cohort interoperability demonstration | Month 36 | All six | Published DPI interoperability case study |
| 8 | Second-cycle assessment and reporting | Month 48 | All six | Updated baseline; revised roadmaps for all jurisdictions |
References and Standards
All normative standards, institutional frameworks, and academic sources cited in this framework, listed in compliance with Harvard Author-Date citation conventions.
All references in this framework are drawn from authoritative institutional publications, formally published standards documents, and peer-reviewed academic sources. In accordance with the framework’s methodological commitment to verifiability, internet URLs have been excluded from citations where documents are identifiable by their formal bibliographic identity — consistent with citation practice for archival, institutional, and standards documents intended for academic audiences.
Primary Normative Sources
- Digital Impact Alliance (2023). Digital ID Assessment Guidebook, Version 0.1.0, c286661. Digital Impact Alliance. ©2023 Digital Impact Alliance. [Primary normative source for all INTEROPERABILITY, DATA POLICIES, and PRIVACY criteria cited throughout this framework. All §3 criteria codes and normative quotations are sourced from this document.]
- National Institute of Standards and Technology (2022). Digital Identity Guidelines. NIST Special Publication 800-63-4 (Initial Public Draft). U.S. Department of Commerce, National Institute of Standards and Technology. [Primary source for definitions of Issuer, Holder, Reliant Party, Subject, Identity Assurance Level, and Identity Lifecycle as adopted in this framework.]
- National Institute of Standards and Technology (2012). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). NIST Special Publication 800-122. U.S. Department of Commerce. [Source for Personally Identifiable Information definition.]
- Internet Engineering Task Force (1997). Key Words for Use in RFCs to Indicate Requirement Levels. RFC 2119. IETF. S. Bradner, Harvard University. [Source for MUST, SHOULD, MAY, and MUST NOT normative language conventions employed throughout this framework and in the DIAL Guidebook.]
International Technical Standards
- International Organization for Standardization and International Electrotechnical Commission (2022). Information Security, Cybersecurity and Privacy Protection — Information Security Management Systems — Requirements. ISO/IEC 27001:2022. International Organization for Standardization. [Referenced for ISMS standards baseline applicable to identity system operators under the MANAGEMENT and ORG-SECURITY criteria domains of the DIAL Guidebook.]
- International Organization for Standardization and International Electrotechnical Commission (2021). Identification Cards — ISO-Compliant Driving Licence — Part 5: Mobile Driving Licence (mDL) Application. ISO/IEC 18013-5:2021. International Organization for Standardization. [Referenced as primary example of a recognised standard for mobile identity credentials, relevant to INT-1 standards compliance assessment.]
- World Wide Web Consortium (2022). Verifiable Credentials Data Model v1.1. W3C Recommendation, 03 March 2022. World Wide Web Consortium. M. Sporny, G. Noble, D. Longley, D. Burnett, B. Zundel, K. Den Hartog (Editors). [Referenced as primary credential format standard for INT-1 compliance and trust framework interoperability.]
- International Organization for Standardization and International Electrotechnical Commission (2022). Consumer Protection — Privacy by Design for Consumer Goods and Services — High Level Requirements. ISO/IEC 31700-1:2023. International Organization for Standardization. [Referenced for Privacy by Design principles under the DIAL Guidebook’s PRIVACY-4 criterion.]
Interoperability and DPI Frameworks
- European Commission (2017). European Interoperability Framework — Implementation Strategy. COM(2017) 134 final. European Commission. [Primary source for the four-level interoperability typology (Technical, Semantic, Organisational, Legal) adapted for DPI contexts in §2.1 of this framework.]
- Centre for Digital Public Infrastructure (2022). Defining DPI: A Conceptual Overview of Digital Public Infrastructure. CDPI Working Paper. Centre for Digital Public Infrastructure. [Source for DPI three-layer architecture (Identity, Data Exchange, Payments) referenced in §2.2.]
- Gelb, A. and Clark, J. (2013). Identification for Development: The Biometrics Revolution. Working Paper 315. Centre for Global Development. [Source for developing country identity systems analysis and interoperability typology context referenced in §2.1.]
- Gelb, A. and Metz, A. (2018). Identification Revolution: Can Digital ID Be Harnessed for Development? Center for Global Development. [Background context for identity system development trajectories in Sub-Saharan Africa.]
- World Bank Group (2021). Identification for Development (ID4D) Global Dataset 2021. World Bank Group. [Background statistical context for identity enrolment coverage referenced in country profiles.]
Regional and Continental Policy Frameworks
- African Union (2020). The Digital Transformation Strategy for Africa (2020–2030). African Union Commission. [Continental context establishing digital identity harmonisation as a prerequisite for the continental digital single market.]
- African Union (2022). African Union Data Policy Framework. African Union Commission. [Framework for continental data governance, cross-border data flows, and data sovereignty — directly relevant to trust framework design under INT-A.1.]
- African Continental Free Trade Area Secretariat (2021). Protocol on Digital Trade: Preliminary Position Paper. AfCFTA Secretariat. [Context for digital identity as a prerequisite for AfCFTA digital trade implementation.]
- East African Community (2016). EAC Digital Payment Integration Project: Regional Payment and Settlement System Framework. EAC Secretariat. [Context for EAC interoperability obligations relevant to Rwanda and Ethiopia country profiles.]
- Southern African Development Community (2015). SADC Industrialisation Strategy and Roadmap 2015–2063. SADC Secretariat. [Context for SADC digital identity harmonisation obligations relevant to Zambia and Malawi country profiles.]
- Economic Community of West African States (2018). ECOWAS Biometric Identity Card Project: Technical Standards and Implementation Framework. ECOWAS Commission. [Context for ECOWAS identity harmonisation framework applicable to Ghana and Nigeria country profiles.]
- Intergovernmental Authority on Development (2020). IGAD Regional Migration Policy Framework. IGAD Secretariat. [Context for Horn of Africa identity interoperability applicable to Ethiopia’s regional obligations.]
Academic and Policy Research
- Singh, N. and Bhatt, N. (2023). ‘Digital Public Infrastructure: Building Blocks for Inclusive Digital Economies’, Journal of Development Policy and Practice, 8(1), pp. 45–68. [Source for DPI silo risk argument in §2.2 and foundational DPI governance analysis.]
- Demirgüç-Kunt, A., Klapper, L., Singer, D., Ansar, S. and Hess, J. (2022). The Global Findex Database 2021: Financial Inclusion, Digital Payments, and Resilience in the Age of COVID-19. World Bank. [Background context for financial inclusion imperatives of identity interoperability in Sub-Saharan Africa.]
- Pisa, M. and Juden, M. (2017). Blockchain and Economic Development: Hype vs. Reality. Policy Paper 107. Center for Global Development. [Context for technology-solutionism risks in identity system design, applicable to vendor lock-in analysis.]
