Getting Started — Your Profile

Welcome to Ledger Wallet®. This “Profile” page helps you set up and manage your personal identity within your Ledger account. In this guide, you’ll learn how to configure your profile, secure your credentials, and maintain best practices.

User Avatar

Jane Doe

Member since: June 2025

Status: Verified

Your profile is the central place where your personal settings, security preferences, and identity credentials are managed. Think of it as your control center.

1. Profile Overview & Navigation

Once you log into your Ledger account and navigate to “Profile,” you’ll see several tabs or sections. These may include:

Click on any tab to expand and view details. The interface is responsive, so on mobile the sections collapse into accordions for easy access.

2. Personal Information

Start by reviewing and filling in your personal information:

After updating any field, always click “Save Changes” to commit your updates. If any change triggers verification (e.g. changing your email), Ledger may prompt additional verification steps.

3. Security Settings

This is a critical section. Your security settings protect your account, your funds, and your identity.

2-Factor Authentication (2FA)

Enabling 2FA adds a second layer of security. Ledger currently supports:

To enable 2FA:

  1. Go to “Security Settings” > “Enable 2FA.”
  2. Choose the method (Authenticator / SMS / Hardware key).
  3. Follow the on‑screen prompts to link your device.
  4. Verify with the test code or key challenge.

Once active, 2FA is required on new logins, profile changes, and critical operations.

Password & Recovery Phrase

Your Ledger account password grants access to your profile UI (not the crypto keys themselves). Choose a strong, unique password.

In addition, the recovery phrase (or “seed phrase”) remains your ultimate fallback. **Ledger never stores your recovery phrase** — you store it offline. If you lose it, you may permanently lose access.

Whenever you update sensitive security settings (e.g. device pairing), the system may prompt you to re‑enter your password or reconfirm your recovery phrase.

Device Pairing & Trusted Devices

You can link trusted devices (laptops, phones, tablets) to your account. Each new device requires authorization via 2FA or a QR / challenge code.

To revoke a device, go to Security Settings > Devices, then click “Revoke” beside any device you no longer use.

4. Credentials & Verifiable Claims

One of Ledger’s core features is supporting **verifiable credentials** — cryptographic claims about your identity, attestations, or attributes. You can store, view, and share them selectively.

Examples:

Your profile may include a list of your active credentials. Each credential is stored off‑chain or encrypted, and you control when and with whom to share.

Viewing Your Credentials

Under the “Credentials” tab, you’ll see a list like this:

Click any credential to view detailed metadata (e.g. cryptographic proof, expiration, revocation registry status).

Adding or Importing a Credential

To add or import a credential, follow these steps:

  1. Go to Credentials > Add Credential.
  2. Enter or paste the credential JSON or token (as provided by issuer).
  3. Verify metadata (issuer, issuance date, expiration).
  4. Approve storage (encrypted under your keys).

Ledger never “sees” the private keys or raw credential data — only encrypted blobs under your control.

Sharing Credentials

When a third party (e.g. verifier) requests proof, you can choose which credentials to share. Ledger helps create **verifiable presentations** that prove trust without revealing unnecessary data.

On-demand, you can:

5. Activity & Logs

Every meaningful action on your profile is logged for transparency and security auditing. Under Activity / Logs, you’ll see entries such as:

Each log entry includes the timestamp (UTC), device, IP, and a brief description. If you notice suspicious activity, immediately revoke devices or change your password / recovery phrase.

6. Settings & Preferences

Under Settings, you can configure:

Ensure that auto‑logout is enabled (e.g. 5 minutes, 15 minutes) to reduce exposure on shared machines.

7. Best Practices & Security Tips

To maintain a safe and healthy profile, follow these recommendations:

8. Troubleshooting & FAQs

Why can’t I change my email?

For security reasons, changing your email triggers a verification flow. You will receive a confirmation link at both old and new emails. Also, 2FA must be active before changes can proceed.

I lost my 2FA device. How do I regain access?

If you lose your 2FA device, use your recovery backup codes (provided when you enabled 2FA), or contact support with your verification documents. However, support will never ask for your recovery phrase — you must prove identity otherwise.

A credential I shared is now revoked. What happens?

Once a credential issuer marks it revoked (on their revocation registry), your stored credential remains in your profile but with “Revoked” status. Verifiers will reject presentations using revoked credentials.

Someone accessed my account. What should I do?

Immediately:

  1. Change your password.
  2. Revoke all paired devices.
  3. Review activity logs for the intrusion point.
  4. If you suspect your recovery phrase is compromised, migrate assets to a new seed phrase & wallet.
  5. Contact Ledger support for guidance.

9. Next Steps & Recommendations

Once you’ve reviewed and built your profile, here’s what to explore next:

  1. Go to **Dashboard** to view your wallets, balances, and transactions.
  2. Visit **Security Center** to run a security check or audit.
  3. In **Credentials**, try adding a sample credential or request a proof from a test verifier.
  4. Check **Settings** and toggle auto‑logout, display options, and privacy settings.
  5. Bookmark your profile and security pages for quick access.

If you ever need assistance, our Support Center and Help Articles are available 24/7.

Go to Dashboard