OPEN BADGES 2.0 • Hosted verification • Email-based identity • OB-specific JSON-LD • Optional JWS signing • Badge-only ecosystem • Released 2018 UPGRADE OPEN BADGES 3.0 • Cryptographic proofs • DID + email identity • W3C VC Data Model • Required signing • Full VC ecosystem • Released 2022 Open Badges 2.0 vs 3.0 Key Differences & Migration Guide · IssueBadge.com
Standards & Technology · Cluster Article 2

Open Badges 2.0 vs 3.0: Key Differences and Migration Guide

By IssueBadge.com Editorial Team  ·  Published March 16, 2026  ·  2,100 words  ·  10 min read

If you've been running a badge program on Open Badges 2.0 and you're hearing about Open Badges 3.0, you probably have the same question everyone does: do I need to do anything, and if so, what?

The short answer is that OB 2.0 is not going away tomorrow and your existing badges are still valid. But OB 3.0 represents a meaningful upgrade, not just a minor revision, and understanding the differences will shape decisions about platform selection, recipient experience, and future-proofing your credential program.

This guide covers everything: what actually changed, what it means in practice, and a concrete migration path if you decide to move forward. For the full context on Open Badges themselves, start with What Are Open Badges? Complete Explanation of the Standard, and for the broader credential field, see the Digital Credentials Complete Guide.

Why a new version Was needed

Open Badges 2.0, released in 2018, served the badge ecosystem well. But by the early 2020s, two problems were becoming clear.

Problem 1: Verification depended on the issuer's server. In OB 2.0, badge assertions are hosted at a URL controlled by the issuing platform. If that URL goes down, because the platform shuts down, the issuer stops paying, or infrastructure changes, the badge becomes unverifiable. This is a fragile foundation for credentials that are supposed to last years.

Problem 2: Siloed ecosystems. The digital credential space was fragmenting. Open Badges lived in one ecosystem. W3C Verifiable Credentials (used in enterprise identity, government systems, and decentralized identity) lived in another. Badges couldn't be used in VC wallets. VC systems couldn't read badge metadata. This made interoperability difficult and limited the reach of badge credentials.

Open Badges 3.0 was designed to solve both problems by aligning the badge data model with the W3C Verifiable Credentials Data Model, the emerging global standard for digital credentials.

The 6 key differences at a glance

Open Badges 2.0

  • OB-specific JSON-LD context
  • Hosted assertion verification
  • Email-based recipient identity
  • Optional JWS signing
  • Badge-specific ecosystem only
  • Server dependency for verification

Open Badges 3.0

  • W3C VC Data Model
  • Cryptographic proof (required)
  • DID or email recipient identity
  • Signing required (LD-Proofs or JWT)
  • Interoperable with VC ecosystem
  • Server-independent verification
FeatureOB 2.0OB 3.0
Data model OB-specific JSON-LD (openbadges/v2) W3C VC Data Model (credentials/v1)
Credential type Assertion OpenBadgeCredential (a W3C VC type)
Recipient identifier Hashed email address DID or email (more options)
Cryptographic proof Optional, JWS signing supported Required, LD-Proofs or JWT VC
Verification method Hosted URL (server required) Cryptographic signature (server-independent)
Wallet compatibility Badge-specific platforms only Any W3C VC-compatible wallet
Issuer identifier URL (Profile endpoint) DID or URL
Evidence model Evidence array (URL + description) Enhanced evidence with type declarations

The data model Change: what it really means

The shift from the OB-specific JSON-LD context to the W3C VC Data Model is the structural foundation of everything else in OB 3.0. Let's unpack what it means in practice.

In OB 2.0, a badge assertion looks like this at a high level: it uses @context: "https://w3id.org/openbadges/v2" and is structured around OB-specific types like Assertion, BadgeClass, and IssuerProfile.

In OB 3.0, the same credential uses @context: ["https://www.w3.org/2018/credentials/v1", "https://purl.imsglobal.org/spec/ob/v3p0/context.json"] and is structured as a VerifiableCredential with a credentialSubject containing the badge achievement data. The issuer becomes the VC issuer. The recipient becomes the credential subject.

This means that any system that can read a W3C Verifiable Credential can now understand an OB 3.0 badge, as long as it also understands the OB 3.0 extension context for badge-specific fields like achievements, criteria, and alignments.

For non-technical decision-makers: The data model change is like changing the underlying file format of a document. The content (what the badge means, who earned it) is the same, but the file is now in a format that far more systems can read and process. It's a compatibility upgrade, not a content change.

Cryptographic proofs and why they matter

This is a highly important change from a reliability perspective. In OB 2.0, verification requires fetching the badge assertion from the issuer's hosted URL. If the URL is unavailable, verification fails. There is no alternative.

In OB 3.0, every badge is signed with the issuer's private key. The public key is published, either at a URL or via a DID document. Anyone who has the badge can verify the signature locally, without ever contacting the issuer's server. This is called server-independent verification.

Why does this matter? Because credentials are supposed to be long-lasting. A professional certification earned in 2024 should still be verifiable in 2034, regardless of whether the issuing platform is still online. Cryptographic proofs provide that durability. Hosted URLs do not.

OB 3.0 supports two proof mechanisms:

Recipient Identity: email vs DID

In OB 2.0, recipients are identified by a hashed email address. This works, but it's tied to an email address the person may change, and it relies on a third-party identity provider (the email service) to define the person's identity.

In OB 3.0, recipients can be identified by either:

DIDs are powerful because they're self-sovereign, the holder controls them. If someone changes their email, their DID-based credentials still identify them. If they want to selectively disclose certain credentials to certain verifiers, DID-based systems support that through selective disclosure mechanisms.

For most badge programs today, email-based identity is still perfectly adequate. DIDs are more relevant for high-stakes credentials (professional licenses, academic records) and enterprise deployments where identity portability is a hard requirement.

Interoperability: The big win of OB 3.0

The biggest strategic benefit of OB 3.0 is interoperability with the broader W3C VC ecosystem. What does that unlock?

The strategic view: OB 2.0 created the badge ecosystem. OB 3.0 connects that ecosystem to the entire world of verifiable digital credentials. An OB 3.0 badge isn't just a badge, it's a credential that can travel anywhere a W3C VC can travel.

Backward compatibility

One of the most common questions: do OB 2.0 and 3.0 work together?

The direct answer is no, they use different data models and different verification methods. A system built to verify OB 2.0 badges cannot verify OB 3.0 badges without being updated. And a system built only for OB 3.0 cannot verify OB 2.0 badges unless it implements both versions.

Important: Many current badge verifiers (like the old Badgr verifier) are built for OB 2.0. If you start issuing OB 3.0 badges, make sure your recommended verification method is updated to support OB 3.0, or your recipients' badges will fail verification on older tools.

1EdTech has published conformance certification requirements for OB 3.0, and platforms that achieve conformance certification should handle both versions. Always check your platform's conformance claims before committing to a migration.

Migration Guide: moving from OB 2.0 to OB 3.0

Here's a practical migration framework for organizations currently issuing OB 2.0 badges.

1

Audit your current badge program

Catalog all active badge classes, the volume of issued badges, and which platform is handling issuance. Note any integrations (LMS, event systems, CRM) that will need to be updated.

2

Confirm your platform's OB 3.0 support

Ask your badge platform vendor directly: do you support OB 3.0 issuance? Are you 1EdTech conformance-certified for OB 3.0? What is your migration timeline if not yet supported?

3

Decide on historical badges

Determine whether to leave existing OB 2.0 badges as-is or re-issue them in OB 3.0. For most programs, leaving historical OB 2.0 badges in place is fine, they remain valid under OB 2.0. Only re-issue if recipients specifically need OB 3.0 compatibility.

4

Update your BadgeClasses and issuer profile

In OB 3.0, the issuer profile needs to include a public key (DID or key URL) for the cryptographic signing to work. Work with your platform to ensure your issuer profile is OB 3.0-compliant.

5

Update recipient communications

Inform recipients about the change, particularly if they use badge display platforms that may need updating. Update any verification instructions you provide.

6

Test thoroughly before going live

Issue a test OB 3.0 badge to yourself. Verify it using an OB 3.0-compatible verifier. Check that the LinkedIn share works correctly. Confirm the badge displays properly in your preferred wallet (if applicable).

Should You Migrate Now?

Whether to migrate immediately depends on your specific situation. Here's a simple decision framework:

The one thing you should do regardless of migration timing: ensure your existing OB 2.0 badges are hosted on infrastructure that will remain stable. The hosted URL dependency of OB 2.0 is its Achilles heel, and you don't want credentials to become unverifiable because your platform changes domains or shuts down a service.

Frequently asked questions

What is the biggest difference between Open Badges 2.0 and 3.0?

The biggest difference is the data model. OB 3.0 is built on the W3C Verifiable Credentials Data Model, making OB 3.0 badges technically W3C Verifiable Credentials with required cryptographic proofs, DID support, and interoperability with the full VC ecosystem. OB 2.0 uses its own data model with optional signing and server-dependent verification.

Are Open Badges 2.0 badges still valid?

Yes. OB 2.0 badges remain valid and verifiable under the OB 2.0 standard as long as the hosted assertion URLs are maintained. The standard is not deprecated. However, OB 2.0 badges are not compatible with W3C VC wallets or the broader VC ecosystem.

Do I need to re-issue old badges when migrating to OB 3.0?

Not necessarily. Existing OB 2.0 badges remain valid under OB 2.0. Most organizations migrate new issuances to OB 3.0 and leave historical badges on OB 2.0. Re-issuance makes sense only if recipients specifically need OB 3.0 compatibility for wallet use.

What is a DID in Open Badges 3.0?

A Decentralized Identifier (DID) is a cryptographically controlled identifier like "did:web:example.com" that the holder controls independent of any central service. OB 3.0 supports DIDs as recipient and issuer identifiers, enabling self-sovereign identity. Email-based identifiers are still supported for simplicity.

Which badge platforms support Open Badges 3.0?

OB 3.0 adoption is growing. Check with your platform vendor for their specific OB 3.0 support and 1EdTech conformance certification status. When evaluating new platforms, ask for explicit OB 3.0 support before committing.

Issue standards-Compliant Digital Badges

IssueBadge.com supports Open Badges-compliant issuance with bulk upload, custom design, LinkedIn sharing, and verification built in.

Start Issuing Free →