Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 170 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
Authority in KERI refers to cryptographically verifiable control over identifiers and the delegation of specific rights (signing authority, rotation authority, or proof-of-authority for credentials), established through key event logs rather than administrative hierarchies.
In the KERI ecosystem, authority represents a fundamental departure from traditional identity systems by establishing control through cryptographic verification rather than administrative designation. Authority encompasses three distinct but interrelated concepts:
The core principle is that authority derives from cryptographic proof rather than institutional designation. An entity demonstrates authority by proving control over private keys that correspond to public keys committed in verifiable data structures (KELs and ACDCs).
Key Properties:
Scope and Boundaries: Authority in KERI is strictly limited to what can be cryptographically proven. It does not address legal authority, organizational hierarchy, or social trust—these must be established through separate mechanisms, though they can be attested to using KERI's cryptographic infrastructure.
When verifying authority over an AID, validators must:
When implementing delegated authority:
dip) with di field pointing to delegator's AIDFor custodial patterns:
When implementing credential authority chains:
Traditional identity systems establish authority through administrative hierarchies:
Certificate Authority (CA) Model: In PKI systems like X.509, authority flows from root CAs through intermediate CAs to end-entity certificates. The root CA's authority is administratively designated (often through browser/OS inclusion), and all downstream authority depends on this administrative trust.
Federated Identity: Systems like SAML and OAuth establish authority through federation agreements between identity providers and relying parties. Authority to authenticate users or issue tokens derives from contractual relationships and configuration, not cryptographic proof.
Blockchain Governance: Distributed ledger systems attempt to decentralize authority through consensus mechanisms, but authority over the consensus process itself often remains centralized (through foundation governance, mining pools, or validator sets).
These traditional approaches share common limitations:
KERI establishes authority through Key Event Logs (KELs)—cryptographically verifiable, append-only logs that record all key management events for an identifier. Control authority is proven by:
This approach means authority is self-contained in the KEL—anyone can verify current control authority by processing the event log without consulting external registries or trusted parties.
KERI introduces a critical innovation: bifurcating control authority into two distinct types:
Signing Authority: The right to sign non-establishment events (interactions, credential issuances, etc.) using current keys. This enables day-to-day operations.
Rotation Authority: The right to rotate keys and change the authoritative key set through establishment events. This represents ultimate control.
This separation enables custodial rotation patterns where:
This is implemented through partial rotation, where different key sets control different aspects of the identifier.
KERI supports cooperative delegation where both delegator and delegate must participate in establishing the delegation relationship:
This creates hierarchical authority structures (delegation trees) where:
While KELs establish control authority over identifiers, ACDCs (Authentic Chained Data Containers) convey proof-of-authority for specific rights, permissions, or entitlements:
Chained Proof-of-Authority: ACDCs can form chains where:
This enables verifiable delegation chains for credentials, where authority to issue specific credential types can be traced cryptographically to a root authority.
KERI introduces the concept of authoritative key state—the set of keys that have received attestations verifying control to the root-of-trust. A key set is authoritative when:
This establishes a time-dependent authority model where the authoritative key set evolves through rotations, and validators can determine which keys had authority at any point in the identifier's history.
Enterprise Key Management: Organizations can delegate signing authority to operational systems while retaining rotation authority in secure offline storage. This enables:
Credential Ecosystems: The vLEI ecosystem demonstrates hierarchical authority:
Multi-Signature Governance: Organizations can distribute authority across multiple parties:
Portability: Authority is not bound to specific infrastructure—the KEL can be hosted anywhere while maintaining verifiability.
Revocability: Authority can be revoked unilaterally through key rotation, without requiring cooperation from the delegate or any third party.
Auditability: All authority changes are recorded in the KEL, providing a complete, verifiable history.
Scalability: Hierarchical delegation enables authority to scale across large organizations without requiring all parties to directly interact with the root authority.
Security: Separation of signing and rotation authority enables defense-in-depth strategies where operational keys can be compromised without losing ultimate control.
Complexity: Managing separate signing and rotation authority requires more sophisticated key management than traditional single-key approaches.
Recovery Challenges: If rotation authority is lost (e.g., pre-rotated keys are destroyed), the identifier cannot be recovered. This requires careful backup strategies.
Witness Dependency: While witnesses don't control authority, they provide availability and duplicity detection. Choosing and maintaining witness relationships requires operational overhead.
Legal vs. Cryptographic Authority: KERI establishes cryptographic authority, but this doesn't automatically confer legal authority. Organizations must still establish legal frameworks for how cryptographic authority maps to legal responsibility.
Delegation Overhead: Cooperative delegation requires coordination between delegator and delegate, which can add latency compared to unilateral delegation models.