Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 169 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
A namespace that is self-certifying and self-administrating, containing a self-certifying prefix that provides cryptographic verification of root control . All derived AIDs within the same autonomic namespace share the same , , and locus-of-control (RSL), with governance unified under the holding root authority.
An autonomic namespace (AN) represents a fundamental architectural concept in KERI that establishes a cryptographically verifiable, self-governing domain for identifiers. The term "autonomic" derives from "auto nomos" (Greek for "self rule"), emphasizing the namespace's self-managing and self-administrating properties.
The core innovation of autonomic namespaces lies in their self-certifying prefix—a cryptographic identifier that enables anyone to verify the root control authority over the namespace using cryptography alone, without relying on external certificate authorities, registries, or trusted third parties. This self-certifying property eliminates the need for administrative intermediaries in establishing namespace authority.
A critical architectural principle is that all derived AIDs (Autonomic Identifiers) within the same AN share three unified properties:
These three properties are collectively referred to as RSL and represent the unified governance model of autonomic namespaces. The governance is consolidated into a single entity—the controller who holds root authority over the namespace—creating a cryptographically verifiable hierarchy where namespace control can be independently verified without external trust anchors.
Traditional namespace systems rely on administrative trust models where centralized authorities manage identifier-to-key bindings:
DNS/Certificate Authority Model: The Domain Name System combined with Certificate Authorities represents the dominant namespace model for the internet. In this architecture:
Blockchain-Based Namespaces: Distributed ledger technologies introduced algorithmic trust models:
Hierarchical PKI: Traditional Public Key Infrastructure uses hierarchical trust chains:
These traditional approaches share a common limitation: namespace authority cannot be verified through cryptography alone. Verification requires trusting external infrastructure, whether administrative (CAs), algorithmic (blockchains), or hierarchical (PKI chains).
KERI introduces autonomic namespaces as a cryptographic trust model that eliminates dependence on external authorities:
The autonomic namespace begins with a self-certifying identifier prefix derived from cryptographic key material through one-way functions. This prefix serves as the root of the namespace and provides:
Cryptographic Derivation: The prefix is generated from the controller's public key(s) using cryptographic hash functions, creating an identifier that is mathematically bound to the controlling key pair. Anyone can verify this binding by recomputing the derivation.
Inception Event Binding: The prefix is further bound to an inception event that establishes the initial key state and configuration. This event includes:
Key Event Log Foundation: The namespace's authority is maintained through a Key Event Log (KEL)—an append-only, cryptographically chained data structure that records all key state changes. The KEL provides:
The autonomic namespace architecture ensures that all derived AIDs share unified governance:
Root-of-Trust Unification: Every AID within the namespace traces its cryptographic verification back to the same root prefix. This creates a verifiable trust chain where:
Source-of-Truth Consolidation: The namespace maintains a single authoritative source for all identifier state:
Locus-of-Control Centralization: Control authority is unified under the root controller:
Autonomic namespaces achieve true portability because:
Infrastructure Independence: The namespace does not depend on any specific infrastructure:
Cryptographic Self-Sufficiency: Verification requires only:
Self-Sovereignty: The controller maintains exclusive authority:
Autonomic namespaces support hierarchical delegation while maintaining unified governance:
Cooperative Delegation: KERI implements cooperative delegation where both delegator and delegate must participate:
Nested Hierarchies: Delegation can be applied recursively:
Scalability Through Delegation: The delegation model enables:
Autonomic namespaces provide a natural model for organizational identity:
Root Organizational Identity: An organization establishes a root AID that serves as the namespace anchor. This root identity:
Departmental Delegation: Departments receive delegated AIDs:
Employee and System Identifiers: Further delegation enables:
The verifiable Legal Entity Identifier (vLEI) ecosystem demonstrates autonomic namespaces in practice:
GLEIF Root Namespace: GLEIF establishes the root autonomic namespace:
QVI Delegation: Qualified vLEI Issuers receive delegated authority:
Legal Entity Credentials: Legal Entities receive credentials:
Compromise Recovery: Autonomic namespaces enable robust compromise recovery:
Duplicity Detection: The unified governance model enables:
Zero-Trust Architecture: Autonomic namespaces support zero-trust principles:
Operational Complexity: Managing autonomic namespaces requires:
Root Key Security: The root key represents a critical asset:
Delegation Management: Hierarchical delegation introduces:
Witness Infrastructure: While portable, autonomic namespaces require:
Despite these considerations, autonomic namespaces represent a fundamental advancement in identifier systems, providing cryptographically verifiable, portable, and self-sovereign namespace management that eliminates dependence on external authorities while enabling scalable hierarchical governance.
Root Authority Management: The root controller of an autonomic namespace holds ultimate authority and must implement appropriate security measures:
Delegation Policies: Organizations implementing autonomic namespaces should establish:
Namespace Design: When designing autonomic namespace hierarchies:
Infrastructure Independence: Autonomic namespaces achieve portability through:
Migration Scenarios: The portability of autonomic namespaces enables:
Graduated Security Model: Autonomic namespaces support graduated security:
Compromise Isolation: The hierarchical structure enables: