User Experience Guidance

TO DO: Provide abstract

Version 1.0 Draft 27 October 2025 · Version history

License

This specification is subject to the W3C Patent Policy (2004).

For sample or reference code included in the specification itself, that code is subject to the Apache 2.0 license, unless otherwise designated. In the case of any conflict or confusion within this specification repository between the W3C Patent Policy (2004) or other designated license, the terms of the W3C Patent Policy (2004) shall apply.

These terms are inherited from the Decentralized Identity Foundation Project Charter.

Contributing

This section is non-normative.

This specification is an active working draft. If you wish to contribute to its development, please view the CAWG membership page.

Foreword

Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. No party shall be held responsible for identifying any or all such patent rights.

Any trade name used in this document is information given for the convenience of users and does not constitute an endorsement.

This document was prepared by the Creator Assertions Working Group, a working group of the Decentralized Identity Foundation.

THESE MATERIALS ARE PROVIDED “AS IS.” The Contributors and Licensees expressly disclaim any warranties (express, implied, or otherwise), including implied warranties of merchantability, non-infringement, fitness for a particular purpose, or title, related to the materials. The entire risk as to implementing or otherwise using the materials is assumed by the implementer and user. IN NO EVENT WILL THE CONTRIBUTORS OR LICENSEES BE LIABLE TO ANY OTHER PARTY FOR LOST PROFITS OR ANY FORM OF INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER FROM ANY CAUSES OF ACTION OF ANY KIND WITH RESPECT TO THIS DELIVERABLE OR ITS GOVERNING AGREEMENT, WHETHER BASED ON BREACH OF CONTRACT, TORT (INCLUDING NEGLIGENCE), OR OTHERWISE, AND WHETHER OR NOT THE OTHER MEMBER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Table of contents

1. Introduction

The Creator Assertion Working Group (CAWG) provides identity-based recommendations for implementers of Coalition for Content Provenance and Authenticity (C2PA) user experiences (UX). Similar to the C2PA User Experience Guidance for Implementers, this document defines best practices for presenting CAWG identity assertions within a C2PA Manifest.

CAWG UX recommendations describe standard, recognizable experiences that:

  • Provide a named actor a means to express individual or organizational identity assertions about a C2PA asset, and

  • Provide C2PA Manifest consumers with clear, trustworthy information about who is involved in the asset’s creation and modification.

By following these guidelines, implementers can help ensure that identity-related information is represented consistently, transparently, and in a way that enhances trust in the overall provenance experience.

2. Principles

CAWG UX recommendations adhere to the same foundational principles outlined in the C2PA User Experience Guidance for Implementers and extend them with CAWG-specific considerations.

2.1. Hierarchy of trust

Research consistently shows that identity is one of the strongest trust signals audiences look for when evaluating content. CAWG identity assertions should be easy to locate, clearly understandable, and visually distinct from other provenance information in a C2PA Manifest.

Not all identity assertions hold the same level of verifiability. Likewise, not all C2PA implementers will choose to display identity information, even if present in a C2PA Manifest. Therefore, verified identities should be surfaced prominently within progressive disclosure interfaces (L1-L3) and visually differentiated from referenced or self-declared information. Hierarchy within the identity section helps establish clarity and confidence.

Representing individual human and organizational identity enhances the value of Content Credentials in many contexts but also introduces sensitivity around privacy. Actors must be informed of any personally identifiable information included in their Content Credentials and provided the option to add, remove, or decline inclusion prior to Manifest signing.

2.3. Clarity of verification

Implementations should communicate verification status and issuer relationships clearly to help audiences assess credibility. When identity is backed by a trusted certificate authority, implementers should disclose who verified the information, the verification method, and the corresponding root of trust. Manually entered or unverified information must be labeled accordingly.

2.4. Consistency with C2PA UX

CAWG implementations should maintain parity with the overall C2PA UX guidance. Terminology, progressive disclosure levels, and interaction models should align to ensure users experience Content Credentials consistently across implementations and contexts.

3. Patterns

3.1. C2PA information hierarchy

CAWG identity assertions should appear as a distinct group within a C2PA Manifest display, separate from general C2PA assertions. Within this section, verified identities should be presented before referenced or self-declared identities to establish a clear hierarchy of trust across the levels of progressive disclosures.

progressive disclosure
Figure 1. Examples of different levels of informational progressive disclosures

Identity information should follow the progressive disclosure model established by the C2PA UX progressive disclosure framework:

  • Level 1 (L1): Consideration should be given to displaying organizational identity, whereas individual identity data may be omitted to preserve brevity.

  • Level 2 (L2): Surfaces verified identity with concise attribution and, where space allows, the actor’s primary role.

  • Level 3 (L3): Expands to include detailed verification information, issuer relationships, verification methods, and root-of-trust references.

Hierarchy should be applied both across disclosure levels and within the identity section itself, ensuring that verified identities are visually and semantically distinct from referenced ones. When multiple actors are associated with an asset, roles and trust levels should determine their order of presentation.

3.2. Verification type and status

Verification is a core differentiator in identity-based Content Credentials. Verified identities are generally considered more trustworthy than self-asserted or manually entered names. Implementers should make verification states explicit through clear labeling and iconography.

3.2.1. Identity claims aggregation

Verification may occur directly through a credential issuer or indirectly through an identity claims aggregator, a trusted intermediary that collects and validates identity signals from multiple sources, such as verified websites, social accounts, government ID providers, professional accreditors, or organizational affiliations.

Aggregators re-express these identity signals on the actor’s behalf, binding them to a specific C2PA asset without requiring the actor to issue a direct signature.

User interfaces should make it clear when verification is derived from aggregated attestations rather than directly from the actor or issuer. Phrases such as “Verified by [Identity Provider]” or “Attested by [named actor]” help C2PA Manifest consumers interpret the relationship between the actor, the aggregator, and the verification sources.

3.2.2. Verification methods

Different verification methods may contribute to an actor’s aggregated identity. Common examples include verifying a government-issued ID, confirming control of a social-media account via OAuth, or proving domain ownership through DNS configuration.

Verification always occurs outside the C2PA Manifest-creation process, and participation is always opt-in. Creators must retain full control over whether to include verified identity information in their Content Credentials based on their privacy preferences.

Providing additional brief contextual information about the verification method, such as its type or source, helps C2PA Manifest consumers make informed judgments about trustworthiness, especially in L3 disclosures where additional detail can be displayed.

3.3. Individual and organizational identity

CAWG identity assertions represent named actors, which can include human individuals and organizations. Implementers should distinguish these cases clearly and present them in ways that reflect their differing trust models and verification paths.

3.3.1. Individual identity

individual named actor
Figure 2. Example of an individual named actor and their (optional) role in an identity assertion within a C2PA Manifest display

An individual identity represents a single human named actor, such as a photographer, designer, or writer. Individual identities may include verified names, social profiles, or website links. Because this information often contains personally identifiable data, user consent and visibility controls are essential during the C2PA signing workflow. Implementers must allow the actor to opt in to each element before Manifest signing and provide clear options to review or remove information prior to publication.

When displayed, individual identities should use consistent labeling to indicate the verification source and, where relevant, link to additional supporting contexts. Examples of such contexts include professional accreditations, organizational affiliations, verified social media accounts, or other web-based sources that help substantiate the named actor’s identity claims.

3.3.2. Organizational identity

organizational named actor
Figure 3. Example of an organizational named actor and their (optional) role in an identity assertion within a C2PA Manifest display

Organizations and institutions with established, publicly-recognizable branding can benefit from CAWG identity displays, as defined by the X.509 section of the CAWG identity assertion. Similar to individuals, organizations who are verified by a trusted certificate authority can sign their own Content Credentials.

The display of trusted organizational identity will vary depending on the trust lists that are configured by each verifier. Verifiers are encouraged to use well-established trust lists such as EUTL and AATL to provide a shared basis for trust. Verifiers are also advised to adopt reputable industry-specific trust lists, such as IPTC’s Origin Verified Publisher list, where available and to link out to supporting contexts.

TO DO: Replace EUTL and AATL references with updated guidance.

Organizational identities may include data such as company name, verified domain, or issuing authority. Implementers should display this information clearly, often alongside a logo or verified mark, and maintain consistent visual hierarchy across progressive disclosures.

3.4. Additional identity claims

additional identity claims
Figure 4. Example of an individual named actor’s identity claims aggregation within a C2PA Manifest display

CAWG identity assertions can include linked social profiles and websites as secondary trust signals. When verified through OAuth or DNS validation, these links should inherit verified user interface treatment.

When manually entered, they must be clearly labeled as referenced or unverified. For example, actors may describe their relationship to an asset using standardized roles such as creator, editor, publisher, etc. Because this is a self-attested assertion, it’s important to distinguish this from other verifiable identity information.

Implementers should align with each verification badging and verification conventions to preserve familiarity and ensure audiences interpret trust signals consistently. Consistent terminology promotes interoperability and helps audiences understand each contributor’s involvement.

3.5. Metadata assertions

metadata assertion
Figure 5. Examples of self-declared metadata assertions

CAWG metadata assertions can be included in an interface display, preferably in as a referenced assertion and attested to by a named actor. This provides for the inclusion of information in a C2PA Manifest of assertions like an asset title, license, media identifiers, or any field referenced from standards such as XMP, IPTC, or Exif.

Metadata assertions are usually provided by the actor themselves, but they can also include information verified by another trusted party. When metadata is not attributed to the signer of the C2PA manifest, it should be treated as a referenced assertion within the CAWG identity section. Implementers should clearly show the difference between self-declared and verified metadata so that manifest consumers can understand which information is more trustworthy.

Metadata information should appear in a distinct section, visually separate from verified identity and C2PA provenance data.

4. Components

4.1. Verification indicators

4.1.1. Verification icons

Verification icons are compact visual indicators that represent an actor’s verification state. They should appear adjacent to the actor’s name and include accessible text or tooltips describing the credential issuer and verification details.

A visual symbol or label may indicate that a creator’s identity has been verified and should, when space allows, include information about the verification process and verifier.

Unverified identities, such as names manually entered in metadata assertions, must not display a verification symbol. These should be grouped and labeled to clearly distinguish verified from unverified identity assertions.

4.1.2. Status labels

Textual descriptors such as “Verified by [credential issuer]” or “Verification revoked by [credential issuer]” provide immediate clarity. Labels should be concise, localizable, and follow the tone and casing conventions used throughout the C2PA UX framework.

4.1.3. Warning states

When identity credentials are revoked, expired, or untrusted, the indicator should shift to a clear warning or neutral state accompanied by a plain-language explanation of the issue. Verification indicators must be perceivable to assistive technologies. Color alone must not be used to convey meaning.

4.2. Linked identity claims

When a named actor has aggregated identity claims, implementers should consider reinforcing the legitimacy of those connections by using the appropriate platform logo or iconography. If a named actor is connected through OAuth or equivalent verification, the user interface could display pre-existing verifications. Tooltips should clarify the verification method and platform relationship.

If aggregated claims are manually entered, the user interface must label them as unverified, through labeling, iconography, or both.

Websites can be verified through DNS CNAME or TXT records, and should appear with a verification indicator or label to indicate the status accordingly. Links should open securely and follow standard accessibility and privacy conventions.

Unverified links must be visually distinct and clearly identified as unverified. Implementers may choose to render unverified links as non-interactive text to introduce intentional friction and reduce the risk of misleading attribution.

4.3. Validation states

Verification status may change over time. When validation fails due to credential expiration, issuer revocation, or trust-chain issues, the user interface must present a clear message explaining the current status and, when possible, link to issuer or verifier details.

Messages should use plain language and appear within the context of the identity section rather than as a global error.

5. Open issues

5.1. User research

Correctly identifying and displaying trust signals is of paramount concern for our overall user experience. CAWG and C2PA strive to understand the value consumers will apply to content attribution through ongoing user research studies and usability testing.

5.2. Applications and use cases

There are many potential and general use cases that will warrant further user research and design recommendation to understand the needs of actors using CAWG assertions or consuming them. Additional use cases include topics like support for multiple actors and displaying chosen names instead of verified ones. Unlike C2PA assertions that disclose immutable information about how an asset was created or edited, identity information may be thought of more fluidly. Considerations for enabling mutability for identity assertions should be explored, allowing human actors to maintain maximum control over how they express themselves and preferences for their content.

6. Public review, feedback, and evolution

Developing these recommendations is an ongoing process that involves diverse stakeholders, with the results balancing uniformity and familiarity with utility and flexibility for users across contexts, platforms, and devices.

Feedback, review, user testing, and ongoing evolution is a key requirement for success. The recommendations will therefore be provided in an evolving, companion document, informed by real world experiences deploying CAWG-enabled C2PA Manifests across a wide variety of applications and scenarios.

Appendix A: Version history

This section is non-normative.

27 October 2025

  • Placeholder for working draft.