Plug and Charge is a coordination project, not just a protocol feature
Plug & Charge is easy to like because the user experience is obvious.
For deployers, the harder question is whether the surrounding ecosystem is ready:
- charger hardware and firmware
- backend authorization flow
- certificate provisioning
- roaming and commercial ownership
- support procedures when the certificate flow fails
That is why Plug & Charge should usually start as a controlled rollout decision, not a blanket product promise.
What is Plug & Charge?
Plug & Charge is exactly what it sounds like: the driver plugs in the cable, and charging starts automatically. No app, no RFID card, no QR code. The vehicle and charger handle authentication and billing without any human interaction.
This is defined in ISO 15118, the international standard for vehicle-to-grid communication. Specifically, ISO 15118-2 (the current version) and ISO 15118-20 (the next generation).
Why it matters
Every extra step between "I want to charge" and "my car is charging" loses users. Today's typical flow:
- Find a charger
- Open the app
- Log in (or create an account)
- Select the connector
- Tap "Start"
- Wait for authorization
- Plug in
With Plug & Charge, it's:
- Plug in
That's the entire user experience. Tesla has had this since day one on their Supercharger network. ISO 15118 makes it possible on any charger from any manufacturer.
How it works: the certificate chain
Plug & Charge relies on a Public Key Infrastructure (PKI) — a hierarchy of digital certificates that establish trust between the vehicle, the charger, and the backend systems.
┌─────────────────────────────────────────────────────────┐
│ V2G ROOT CA │
│ (Root of trust for the ecosystem) │
│ │
│ Operated by a trusted third party (e.g., Hubject) │
└───────────────┬──────────────────────┬──────────────────┘
│ │
┌─────────▼────────┐ ┌────────▼─────────┐
│ MO SUB-CA │ │ CPO SUB-CA │
│ (eMSP / Mobility│ │ (Charge Point │
│ Operator) │ │ Operator) │
└────────┬─────────┘ └────────┬─────────┘
│ │
┌─────────▼────────┐ ┌────────▼─────────┐
│ CONTRACT CERT │ │ SECC CERT │
│ (stored in the │ │ (installed on │
│ vehicle's EV │ │ the charger) │
│ Communication │ │ │
│ Controller) │ │ │
└──────────────────┘ └──────────────────┘The key players
V2G Root CA — The root certificate authority that anchors the entire trust chain. Everyone in the ecosystem trusts this root. Currently, Hubject operates the largest V2G Root CA.
MO Sub-CA (Mobility Operator) — The eMSP's intermediate certificate authority. Issues contract certificates for their customers' vehicles.
CPO Sub-CA — The charge point operator's intermediate CA. Issues SECC certificates for their chargers.
Contract Certificate — Stored in the vehicle. Proves "this car belongs to a customer of eMSP X." Contains the contract ID, expiry date, and the customer's public key.
SECC Certificate — Installed on the charger's Supply Equipment Communication Controller. Proves "this charger belongs to CPO Y."
The Plug & Charge handshake
When you plug in a cable, here's what happens in milliseconds:
EV (Vehicle) SECC (Charger)
│ │
│──── 1. SDP Request ────────────────────►│
│ │
│◄─── 2. SDP Response ───────────────────│
│ (charger's IP + security protocol) │
│ │
│──── 3. TLS Handshake ──────────────────►│
│ (mutual authentication using │
│ SECC cert + vehicle cert) │
│◄────────────────────────────────────────│
│ │
│──── 4. PaymentServiceSelection ────────►│
│ (vehicle selects "Contract") │
│ │
│──── 5. PaymentDetailsReq ──────────────►│
│ (sends Contract Certificate chain) │
│ │
│ ┌─────────────────────────────┐ │
│ │ Charger validates the │ │
│ │ contract cert chain against │ │
│ │ the V2G Root CA │ │
│ └─────────────────────────────┘ │
│ │
│◄─── 6. PaymentDetailsRes ──────────────│
│ (authorization granted) │
│ │
│──── 7. ChargeParameterDiscovery ───────►│
│ (voltage, current, energy needs) │
│ │
│──── 8. PowerDelivery (Start) ──────────►│
│ │
│ ⚡ CHARGING BEGINS ⚡ │The entire handshake takes 2-5 seconds. The driver sees nothing — just the charging indicator turning on.
Contract certificate installation
How does the contract certificate get into the vehicle? There are two methods:
Method 1: Factory installation
The OEM installs the certificate during manufacturing. The driver's eMSP contract is linked to the vehicle's VIN. This is how most automakers handle it today.
Method 2: Over-the-air installation
The vehicle requests a new contract certificate through the charger:
EV ──► Charger ──► CPO Backend ──► Certificate
Provisioning
Service (CPS)
│
▼
eMSP Backend
(generates
contract cert)
│
▼
EV ◄── Charger ◄── CPO Backend ◄── Signed
Contract
CertificateThis allows drivers to switch eMSPs or add new contracts without visiting a dealer.
How OCPP fits in
OCPP 2.0.1 includes specific messages for Plug & Charge support:
Certificate management:
InstallCertificate— install V2G root or MO root certificates on the chargerDeleteCertificate— remove expired or revoked certificatesGetInstalledCertificateIds— list all certificates on the charger
Contract certificate provisioning:
Get15118EVCertificate— charger requests a new contract certificate on behalf of the vehicleSignCertificate/CertificateSigned— CSR-based certificate enrollment
Authorization:
AuthorizewithidToken.type = "eMAID"— the charger sends the vehicle's eMAID (e-Mobility Account Identifier) to the backend for authorization
The OCPP flow looks like this:
EV ──► Charger CSMS (Backend)
│ │
│── Authorize(eMAID) ──────────►│
│ │
│ Backend validates the │
│ contract against the eMSP │
│ │
│◄── AuthorizeResponse ────────│
│ (Accepted) │
│ │
│── TransactionEvent ─────────►│
│ (Started) │Current adoption challenges
Vehicle support is limited. Not all EVs have ISO 15118 capable communication controllers. Many older vehicles only support ISO 15118-2 for basic communication, not the Plug & Charge feature.
PKI complexity. Setting up and managing the certificate infrastructure is non-trivial. You need relationships with a V2G Root CA, certificate provisioning services, and your roaming partners' PKI.
Roaming interoperability. Plug & Charge across different networks requires all parties to trust the same V2G Root CA. Cross-root trust is still being standardized.
Cost. Hardware-side, chargers need ISO 15118 compliant communication boards. Software-side, the PKI integration adds complexity.
Launch dependencies you must align
Before pilot, make sure each dependency has an owner:
- Charger readiness Which charger models and firmware versions are actually certified and field-proven?
- PKI trust chain Who installs and manages V2G Root, MO, and CPO trust material?
- Certificate provisioning Which service issues contract certificates, and how is failure handled?
- Backend authorization How is the eMAID resolved, authorized, logged, and reconciled?
- Commercial ownership Which team owns the customer, contract, and roaming relationship behind the certificate?
- Support fallback What should the driver, field team, and support team do when Plug & Charge fails and RFID or app fallback is needed?
If those six items do not have owners, the pilot is not ready.
ISO 15118-20: What's next
The next generation standard adds:
- Bidirectional charging (V2G) — the vehicle can feed energy back to the grid
- Wireless charging support — Plug & Charge without the plug
- Improved certificate management — streamlined provisioning flows
- Better pricing transparency — detailed tariff communication before charging starts
How EV Cloud supports Plug & Charge
EV Cloud provides the OCPP-side infrastructure for Plug & Charge:
- V2G certificate management — install and manage V2G Root CA and MO certificates on your chargers
- Contract certificate provisioning — handle
Get15118EVCertificaterequests and route them to the CPS - eMAID authorization — validate contract certificates against roaming partner databases
- Certificate lifecycle — automated monitoring, renewal, and revocation
The charger hardware and ISO 15118 stack are the charger vendor's responsibility. EV Cloud handles everything on the backend.
Readiness checklist before pilot
Use this before you commit to rollout:
- one charger model validated end to end
- one backend authorization path tested with real contract data
- trust chain installed and auditable
- fallback journey defined for failed authorizations
- support team briefed on expected failure modes
- roaming and billing owners aligned on post-session reconciliation
If the checklist is still incomplete, keep the project in pilot mode.
Next step for rollout teams
If Plug & Charge is on your roadmap, continue with:
- OCPP security profiles explained for certificate and trust-layer planning.
- OCPI roaming guide if customer, contract, and interoperability workflows are also in scope.
- Talk to EV Cloud if your team needs help shaping a controlled pilot and backend readiness plan.