Identity as Financial Access: The Invisible Gate Between People and Capital
Summary
Without a consistent identity framework, financial access remains fragmented and exclusionary.
WERITAS PERSPECTIVES · Identity & Access · April 2025 · 14 min read
Before a borrower can access credit, they must first exist in the eyes of a system. In most of the world, that condition is far from guaranteed. What looks like a credit problem is often, at its root, an identity problem.
There is a question that precedes every credit decision, so foundational that it rarely receives the attention it deserves: who, exactly, is the borrower? In mature financial systems, this question appears trivial. A national identification number, a tax record, a credit bureau file identity is so thoroughly documented that its verification is a background step, automated and near-instantaneous. The credit decision can proceed.
In most of Sub-Saharan Africa, Southeast Asia, and across the broader global south, this question is neither trivial nor resolved. An estimated 850 million people globally lack any form of legally recognised identity. Hundreds of millions more possess identity documents that are fragmented, unrecognised across jurisdictions, or entirely absent from the digital registries that financial institutions require for onboarding. For these individuals, the formal financial system does not begin with a credit decision. It begins with an identity problem and that problem is, for most institutions, a reason not to proceed at all.
The consequences are not abstract. No identity means no bank account. No bank account means no payment history. No payment history means no credit file. No credit file means no loan, no mortgage, no business capital. The exclusion is total, and it compounds over time. Individuals without identity documentation are not merely underserved by the financial system they are, structurally, outside it.
"What looks like a credit problem is very often an identity problem. The gate to financial access is not the loan officer's desk it is the identity verification step that comes long before."
The architecture of exclusion
To understand why identity is so determinative of financial access, it is necessary to understand how financial institutions use identity and what they cannot do without it. Identity verification serves three distinct functions in the credit lifecycle: it establishes legal personhood, it anchors historical data to an individual, and it enables regulatory compliance. Each function, taken individually, is essential. Together, they mean that without a robust, verifiable identity, no part of the credit decision can proceed.
Legal personhood is the most fundamental. A loan is a contract, and contracts require identifiable parties. An institution cannot extend credit to a person who cannot be legally identified not because of bureaucratic preference, but because the legal enforceability of the contract depends on the identity of the borrower being established and verifiable. In jurisdictions where national ID systems are incomplete or unreliable, this requirement alone excludes large segments of the economically active population.
Data anchoring is the second function, and it is equally critical to the credit decision. Credit history, repayment behaviour, income data, utility payment records all of these signals require an anchor, a persistent identifier that allows data from different sources and different time periods to be attributed to the same individual. Without that anchor, data that would establish creditworthiness is either inaccessible or meaningless. The borrower has a history; the institution simply has no way to read it.
Regulatory compliance is the third function. Know Your Customer requirements, Anti-Money Laundering frameworks, and consumer protection regulations all require institutions to verify that they know who they are dealing with. These are not optional they are conditions of the institution's operating licence. A lender that cannot verify a borrower's identity is a lender that cannot legally originate a loan, regardless of its appetite to do so.
| 850M+ | 45% | $1.7T |
| People globally without any legally recognised identity document | Of adults in Sub-Saharan Africa lack sufficient ID for formal financial onboarding | Estimated economic value locked out by identity-linked financial exclusion annually |
Why existing solutions have not been sufficient
The identity gap in emerging markets is not a new observation. Development finance institutions, technology companies, and governments have directed significant resources toward solving it over the past two decades. National biometric ID programmes have been implemented across East Africa, West Africa, and South Asia. Mobile number linked identity schemes have proliferated. Digital KYC platforms have reduced the cost of formal verification. And yet the gap persists in some markets, despite these investments, it has barely narrowed.
The reason is that most existing solutions address identity as a point in time compliance problem rather than as a persistent financial infrastructure challenge. A national ID card solves the legal personhood problem but only in the jurisdiction that issued it, only for the institutions that accept it, and only for the individual who was able to enrol in the programme. It does not solve the data anchoring problem. It does not solve the cross border portability problem. And it does not solve the problem faced by the migrant worker, the rural smallholder, or the informal market trader who operates across multiple contexts, each of which has its own identity requirements.
Mobile number linked identity has been more promising in markets with high mobile penetration, but it carries its own fragility. Mobile numbers change. SIM cards are shared. Operators are not always reliable custodians of identity data. And mobile number identity, like national ID, creates a siloed record useful within a single ecosystem, but not portable across the multiple institutions and contexts that a full financial life requires.
"Most existing identity solutions address a compliance requirement. What the financial system actually needs is persistent, portable, borrower controlled identity that travels across institutions, across borders, and across time."
The portability problem
Even for individuals who possess valid identity documentation, the financial system creates a second-order identity problem: the inability of that identity, and the financial history attached to it, to move. A borrower who has built a repayment record with one institution starts from zero when approaching another. A micro entrepreneur whose mobile money history demonstrates consistent cash flow cannot present that history as a credential to a bank. A worker who has accumulated a credit profile in one city finds that profile meaningless when seeking finance in a different jurisdiction.
This portability problem is not incidental. It is structural, and it serves the interests of incumbent institutions. If a borrower's credit history is trapped within the institution that generated it, that institution enjoys a captive relationship. The borrower cannot easily switch, cannot leverage their history to negotiate better terms, and cannot use their accumulated financial reputation as a credential in new contexts. The history is real; the portability is not.
The consequences compound across the lifecycle of a financial relationship. Early credit is expensive because identity and history cannot be verified cheaply. History that is accumulated is not portable, so each new relationship begins at the same high cost. The borrower pays a persistent identity premium not because they lack creditworthiness, but because the system lacks the infrastructure to recognise and transport that creditworthiness efficiently.
For institutions, the portability problem creates a different but equally significant cost: the inability to onboard creditworthy borrowers efficiently. Every new customer relationship requires the same expensive identity verification process, regardless of whether the customer has an extensive and positive financial history elsewhere. The cost of onboarding a well documented, creditworthy customer is structurally identical to the cost of onboarding a complete unknown because the infrastructure to distinguish between them at scale does not exist.
Self-sovereign identity and the shift in architecture
The emerging framework of self sovereign identity particularly as instantiated through Web5 decentralised identity primitives represents a fundamentally different architectural approach to this problem, and one with significant implications for financial access at scale.
The core principle is a reversal of the current model. In the current model, identity data is held by institutions governments, banks, mobile operators, bureaux and the individual requests access to their own data in each interaction. In the self sovereign model, the individual holds a cryptographically secured, decentralised identity credential that they control and can present to any counterpart. The institution verifies the credential rather than hosting the underlying data. The borrower's history, their verifications, their credentials all travel with them.
The financial implications of this architecture shift are substantial. Onboarding costs collapse when an institution can verify a borrower's identity and history by reading a portable credential rather than reconstructing it from scratch. Cross institutional data sharing, which currently requires complex bilateral agreements and creates significant privacy risks, becomes unnecessary the data stays with the borrower and is presented selectively, with consent, at the point of need. Regulatory compliance is embedded in the credential structure rather than performed anew at each institutional interaction.
Perhaps most significantly, the self sovereign model changes the economics of serving previously excluded populations. The high fixed cost of identity verification which currently makes small balance credit economically unviable at many institutions becomes a variable cost that declines as the borrower's credential portfolio grows. A first time borrower with a robust, verifiable credential set is no longer more expensive to onboard than a known customer. The identity premium disappears.
"When identity travels with the borrower portable, cryptographically verified, and under their control the economics of financial inclusion change fundamentally. Onboarding costs collapse. History becomes portable. The identity premium disappears."
The data layer beneath identity
Identity is the foundation, but it is not the complete structure. A verified identity establishes that a person exists and can be legally engaged; it does not, by itself, establish that they are creditworthy. The second problem building a credit assessment where traditional bureau data is absent or thin requires a data layer that sits above the identity infrastructure and draws from a broader range of signals.
The alternative data available in emerging markets is rich, if not yet well organised. Mobile money transaction histories contain years of cash flow data at the individual level. Utility payment records where formalised reflect consistent financial obligation management. Agricultural input purchase histories capture seasonal economic behaviour. Airtime top up patterns, while imperfect, carry proxy signals for income stability and financial management.
None of these signals, individually, constitute a credit file in the traditional sense. But anchored to a verified, persistent identity and processed through AI driven scoring models trained on local behaviour patterns, they produce actionable credit assessments for populations that formal bureaux cannot reach. The data exists. The identity anchor makes it usable. The scoring infrastructure makes it actionable.
This is not a hypothetical pipeline. The technical components decentralised identity primitives, alternative data aggregation APIs, machine learning credit models calibrated to emerging market behaviour are sufficiently mature to deploy at scale. What has been missing is the integrating architecture: an infrastructure layer that connects these components into a coherent system, accessible to institutions on standardised terms, and portable with the borrower across their financial life.
The identity to credit pipeline: from person to decision
| Layer | Function |
|---|---|
| Layer 1: Identity foundation | Decentralised identity credential issued to the borrower. Cryptographically verified, self sovereign, portable across institutions and jurisdictions. Solves legal personhood and enables data anchoring. |
| Layer 2: Data aggregation | Alternative financial data mobile money flows, utility records, agricultural purchase history aggregated with borrower consent via open data APIs and anchored to the verified identity. Builds a behavioural financial profile where bureau data is absent. |
| Layer 3: Scoring and assessment | AI driven credit scoring models, trained on local market behaviour, process the aggregated data into a standardised credit assessment. Output is a portable, institution readable score that travels with the borrower's identity credential. |
| Layer 4: Institutional access | Participating institutions access the verified identity and credit assessment via standardised API. Onboarding cost collapses. Regulatory KYC compliance is embedded in the credential. The credit decision can proceed on the merits not the identity infrastructure. |
| Layer 5: Capital formation | Standardised, verified credit profiles at scale enable structured credit instruments that international capital providers can price and purchase. Local origination connects to global capital markets for the first time at meaningful volume. |
Privacy, consent, and the governance of identity infrastructure
The power of a portable, data rich identity infrastructure is inseparable from the risks it creates if governed poorly. A system that aggregates financial behaviour data, links it to a persistent identity, and makes it portable across institutions is, if mismanaged, a surveillance infrastructure as much as a financial one. The governance design of identity infrastructure is not a secondary concern it is constitutive of whether the infrastructure serves the individuals it is built for or the institutions that access it.
Several principles are non negotiable in responsible identity infrastructure design. Borrower consent must be granular, informed, and revocable the individual must control what data is shared, with whom, and for what purpose, and must be able to withdraw that consent without penalty to their financial access. Data minimisation must be a design constraint, not an aspiration: institutions should receive only the information necessary to make a specific credit decision, not a comprehensive view of the individual's financial life. And the infrastructure must be technically designed so that the central operator whether a private entity, a consortium, or a public institution cannot unilaterally access or aggregate individual data without the borrower's explicit permission.
These are not merely ethical desiderata. They are also, in well-designed regulatory environments, legal requirements and in markets where consumer trust in financial institutions is fragile, they are commercial necessities. An identity infrastructure that borrowers do not trust will not achieve the adoption necessary to function as shared infrastructure. Trust is not a feature to be added; it is a condition of the system working at all.
The regulatory dimension
Identity infrastructure for financial services operates at the intersection of multiple regulatory regimes: financial services regulation, data protection law, digital identity frameworks, and anti money laundering requirements. In most emerging markets, these regimes are developing in parallel, with varying degrees of coordination. The infrastructure layer must be designed to work within all of them simultaneously not because compliance is a cost to be managed, but because regulatory legitimacy is the condition under which the infrastructure can achieve scale.
Across East African markets, regulatory frameworks for digital credit and digital identity have matured substantially over the past five years. Licensing requirements for digital credit providers, consumer protection standards, and data localisation rules now provide a meaningful framework within which identity linked credit infrastructure can be anchored. The regulatory environment is not permissive it is increasingly demanding but it is also increasingly clear. Building within this clarity, rather than working around it, is both the ethical choice and the strategically sound one.
The alternative building identity infrastructure that outpaces regulatory frameworks and then seeks retroactive legitimacy has a poor track record in financial services. The short term advantage of regulatory arbitrage is consistently outweighed by the long term cost of operating without the trust and enforcement backstop that legitimate regulatory anchoring provides. Infrastructure built on regulatory foundations is infrastructure that can scale.
The Weritas approach to identity
At Weritas, identity is not a compliance step in our credit workflow it is the foundation on which the entire WERITAS ecosystem is built. Our approach to identity infrastructure reflects a specific set of convictions about what it will take to extend meaningful financial access to the populations that current systems cannot reach.
We have built our identity layer on Web5 decentralised identity primitives precisely because we believe the self sovereign model is the only architecture that resolves the portability problem at scale without creating the surveillance risks inherent in centralised approaches. The borrower holds their credential. We do not. Institutions that interact with the Weritas ecosystem verify credentials without requiring us or each other to host the underlying data. The architecture is designed so that trust does not require a trusted central party.
Our alternative data layer is built on the recognition that the populations we serve are not data poor they are data rich in formats that traditional credit infrastructure cannot read. Mobile money transaction histories, agricultural input records, and utility payment data contain genuine predictive signal about creditworthiness. Our AI driven scoring models are trained specifically on behaviour patterns in the markets we operate in, rather than calibrated to bureau data populations in mature markets. We score the person in front of us, not the statistical proxy for a different kind of borrower.
And we have structured the entire system to be interoperable not proprietary. The identity credential a borrower builds within the Weritas ecosystem is theirs, not ours. The credit history they accumulate does not belong to us. The portability of identity and history is not a feature we offer; it is the architecture we have committed to, because we believe that proprietary identity infrastructure ultimately serves institutions rather than the borrowers who should be the primary beneficiaries of what we are building.
"Identity is not a compliance step in the Weritas credit workflow. It is the foundation. The portability of identity and history is not a feature we offer it is the architecture we have committed to."
The connection between identity and financial access is not a policy insight or a development finance talking point. It is a mechanical reality: without a verifiable, portable identity, no credit decision can begin. Billions of people live on the wrong side of this mechanical reality not because they lack economic activity, creditworthiness, or financial aspiration, but because the infrastructure that would allow those attributes to be recognised and acted upon does not yet exist at scale.
Building that infrastructure is technical work, regulatory work, and governance work simultaneously. It requires choices about architecture centralised versus decentralised, proprietary versus open that will determine whether the resulting system serves the individuals it is built for or the institutions that access it. It requires honest engagement with the privacy and consent questions that any data rich identity system raises. And it requires a long-term commitment to building within regulatory frameworks rather than around them.
At Weritas, we believe this work is the precondition for everything else we are trying to do. Not because identity is an interesting problem in isolation, but because without solving it, the credit infrastructure we are building has no foundation to stand on. Identity is not the endpoint of financial inclusion. It is the beginning. And for most of the people we are building for, that beginning has not yet arrived.
This perspective represents the views of the Weritas research team. It does not constitute investment advice or a solicitation of investment. · partners@weritas.io · www.weritas.io