Support for the eIDAS Regulation

As required by the European Commission’s Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC (eIDAS), this section of our website provides information as required by Article 22 of the Regulation relating to the UK’s Trusted List of ‘Qualified Trust Service Providers’ as well as ‘nationally defined trust services’' of types other than those defined under Article 3(16) of Regulation (EU) No 910/2014.
NB these other types of nationally defined trust services are not 'Qualified' according to Regulation (EU) No 910/2014.

The European Commission maintains a tool to browse the national Trusted Lists and the overarching European List of Trusted Lists (LOTL).

UK’s Trusted List

Format of Trusted List (TL)

Article 22(5) of the eIDAS Regulation required the Commission to specify the information to be included in the TL and to define the technical specifications and formats for TL. This was effected by Commission Implementing Decision (EU) 2015/1505 of 8 September 2015.

Latest version

As of 28th February 2020, the latest version of the TSL is at sequence number 21 and with a TSL Identifier value of “UKTSL28February2020”. Update from number 20 to number 21 was: to update the service name of the BT Managed PKI Service from its previous name of BT Assure; to update the status of the ARTL service from Registers of Scotland from 'recognised' to 'deprecated' as they are migrating to a new service under construction; to update the status of the CSCA service from Home Office Technology from 'recognised' to 'deprecated' as they are also migrating to a new service under construction to update the status of both services from the Metropolitan Police Service from 'recognised' to 'deprecated' as they are no longer providing the services and to update the status of the UIS service from Verizon from 'recognised' to 'deprecated' as they are also no longer providing this service.

Machine readable form of Trusted List

Human readable form of Trusted List

.sha2 companion file of Machine readable form of Trusted List*

Previous version

The previous version is still available here:

Machine readable form of previous Trusted List

Human readable form of previous Trusted List

.sha2 companion file of Machine readable form of Trusted List*

* According to ETSI TS 119 612 V2.1.1 clause 6.1 (TL publication) it is recommended to publish, as a companion file, a .sha2 digest file that shall be computed as the SHA-256 hash value of the binary representation of the trusted list XML file. The above file is the lower case text transformation of the HEX encoded binary value of the relevant SHA-256 hash.

Scheme Information

For users of the UK’s Trusted List (relying parties) the Scheme Information page is where they can obtain scheme-specific information, including general introductory information common to all Member States with regard to the scope and context of the Trusted List, and the underlying supervision/accreditation scheme(s) as well as specific information on the UK’s particular supervision/accreditation scheme(s).

Scheme Rules

According to the relevant EC decisions, the Trusted Lists of each of the Member States must specify the Scheme type/community/rules by which the information in the TLs is compiled. This is to be achieved by the inclusion of two URIs, the first refers to common descriptive text that applies to the TLs of all Member States and is as follows:

The second URI points to descriptive text to be used to understand the information specific to the UK:

Why tScheme approval?

It’s the mark which says your service meets the highest standards of trust.



A collection of white papers and presentations from tScheme.


Schemes and Profiles

Providing guidelines and criteria for organisations to develop their trust services.