Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 197 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
Designated aliases are AID-controlled identifiers (such as did:keri or did:webs) that an AID controller formally designates through a self-attested ACDC with no issuee, managing their status via a registry anchored to the controller's KEL, enabling the aliases to populate the 'alsoKnownAs' field in DID documents.
Designated aliases represent a mechanism within the KERI ecosystem that allows an AID (Autonomic Identifier) controller to establish and manage alternative identifiers under their cryptographic control. This process enables a single controller to maintain multiple identifier representations—such as did:keri, did:webs, or other AID-controlled identifier formats—while preserving verifiable control authority through the underlying KERI infrastructure.
The designated aliases mechanism accomplishes several critical functions:
The process is used when an AID controller needs to:
Key participants in the designated aliases process include:
No Issuee Field: The designated aliases attestation MUST NOT include an issuee field. This is a critical distinction from typical ACDCs. The attestation is self-referential—the issuer is making a statement about their own identifiers.
Schema Compliance: Use the official designated aliases schema (SAID: as documented at https://weboftrust.github.io/schema/desig-aliases). The schema defines the required structure including the aliases array in the attributes section.
Registry Requirement: A TEL registry MUST be created and referenced in the attestation's ri field. This registry tracks the issuance and revocation status of the attestation.
Proper Sealing: The TEL issuance event must be anchored to the KEL through an interaction event containing a seal. The seal structure must include:
d)s)Witness Coordination: Ensure witness receipts are collected for the KEL interaction event before considering the designation complete. The witness threshold specified in the AID's configuration must be met.
Event Ordering: TEL events must be properly ordered and anchored. Out-of-order events should be escrowed until their anchoring KEL events are available.
alsoKnownAs Population: The alsoKnownAs field should be populated automatically from the designated aliases attestation. Manual editing risks inconsistency.
Verification Method Synchronization: When the primary AID rotates keys, all DID documents for designated aliases must be updated to reflect the new verification methods.
Web Hosting: For did:webs identifiers:
did.json and keri.cesr at the specified web locationThe designated aliases process follows a structured sequence of operations that establish, maintain, and verify the relationship between a primary AID and its designated aliases.
The process begins with the creation of the alias identifier itself. For did:webs identifiers, this involves:
did:webs identifier is generated following the did:webs method specification, which includes:
did.example.com)did:webs identifier as the subjectalsoKnownAs field (initially empty, to be populated by the designation process)For did:keri identifiers, the process is more direct as the DID is essentially a wrapper around the native KERI AID, but the designation process remains the same.
The controller creates a designated aliases attestation, which is a specialized ACDC (Authentic Chained Data Container) with unique characteristics:
No Issuee: Unlike typical ACDCs that have both an issuer and an issuee, the designated aliases attestation has no issuee field. This is because the attestation is self-referential—the controller is making a statement about their own identifiers.
Attestation Structure: The ACDC contains:
i): The primary AID making the designations): Reference to the designated aliases schema (SAID: as documented in the schema registry)a): An array listing the designated identifiersri): Reference to the TEL registry managing the attestation statusIdentifier List: The attributes section contains the complete list of identifiers being designated as aliases, which may include:
did:keri identifiersdid:webs identifiersExample attestation structure (conceptual):
{
"v": "ACDC10JSON00011c_",
"d": "EAdXt3gIXOf2BBWNHdSXCJnFJL5OuQPyM5K0neuniccM",
"i": "EaU6JR2nmwyZ-i0d8JZAoTNZH3ULvYAfSVPzhzS6b5CM",
"ri": "EACmRy7xMwsxUelUauaXtMxTfPAMPAI6FkekeolOjkggt",
"s": "EBfdlu8R27Fbx-ehrqwImnK-8Cm79sqbAQ4MmvEAYqao",
"a": {
"aliases": [
"did:webs:did.example.com:EaU6JR2nmwyZ-i0d8JZAoTNZH3ULvYAfSVPzhzS6b5CM",
"did:keri:EaU6JR2nmwyZ-i0d8JZAoTNZH3ULvYAfSVPzhzS6b5CM"
]
}
}
The designated aliases attestation must be anchored to the controller's KEL through a registry mechanism:
This anchoring process ensures that:
Once the attestation is created and anchored, the designated aliases populate the DID documents:
DID Document Update: For did:webs identifiers, the DID document's alsoKnownAs field is populated with:
did:keri format if applicable)equivalentId field may also be populated for stronger equivalence claimsPublication: The updated DID document is published to the web location specified by the did:webs method (typically at https://{domain}/.well-known/did.json or a path-specific location)
KERI Event Stream: The keri.cesr file (containing the KEL and TEL events) is published alongside the DID document, enabling full verification of the designation
Example DID document with designated aliases:
{
"@context": [
"https://www.w3.org/ns/did/v1",
"https://w3id.org/security/suites/jws-2020/v1"
],
"id": "did:webs:did.example.com:EaU6JR2nmwyZ-i0d8JZAoTNZH3ULvYAfSVPzhzS6b5CM",
"alsoKnownAs": [
"did:keri:EaU6JR2nmwyZ-i0d8JZAoTNZH3ULvYAfSVPzhzS6b5CM"
],
"verificationMethod": [
{
"id": "did:webs:did.example.com:EaU6JR2nmwyZ-i0d8JZAoTNZH3ULvYAfSVPzhzS6b5CM#key-1",
"type": "JsonWebKey2020",
"controller": "did:webs:did.example.com:EaU6JR2nmwyZ-i0d8JZAoTNZH3ULvYAfSVPzhzS6b5CM",
"publicKeyJwk": {
"kty": "OKP",
"crv": "Ed25519",
"x": "..."
}
}
]
}
Verifiers can validate the designated aliases relationship through a multi-step verification process:
did:webs identifier to obtain the DID documentkeri.cesr file from the web locationalsoKnownAs field in the DID document matches the aliases listed in the attestationThe designated aliases mechanism supports dynamic status management:
Revocation: The controller can revoke the designation by:
alsoKnownAsRotation: If the primary AID undergoes key rotation:
alsoKnownAs relationships remain intactAddition: New aliases can be added by:
The designated aliases mechanism relies on several cryptographic primitives and properties:
SAID Integrity: All ACDCs and critical data structures must use SAIDs (Self-Addressing Identifiers) to ensure content integrity. The SAID is computed as a cryptographic digest of the content, creating an immutable binding between the identifier and the data.
Digital Signatures: The designated aliases attestation must be signed by the issuing AID's current authoritative keys. The signature must:
Key State Verification: Verifiers must validate the entire key state history:
TEL Anchoring: The TEL events must be properly anchored to the KEL through interaction events containing seals. The seal must include:
Schema Validation: The designated aliases ACDC must conform to the official schema, which defines:
Several timing factors affect the designated aliases process:
Witness Propagation: After creating KEL events, time must be allowed for:
DID Document Caching: did:webs resolvers may cache DID documents, leading to:
TEL Synchronization: The TEL must be synchronized with the KEL:
Revocation Timing: When revoking a designation:
Robust error handling is essential for the designated aliases mechanism:
Missing KEL Events: If KEL events cannot be retrieved:
TEL Inconsistencies: If TEL events conflict with KEL:
Schema Violations: If the attestation doesn't match the schema:
Signature Failures: If signatures cannot be verified:
Network Failures: When web resources are unavailable:
Designated aliases are commonly used in several scenarios:
DID Method Bridging: Organizations using KERI infrastructure but needing W3C DID compatibility:
did:webs aliases for external interactionsMulti-Platform Identity: Entities operating across multiple ecosystems:
did:webs for web-based verifiersdid:keri for DID-aware but KERI-native systemsHuman-Readable Identifiers: Creating user-friendly identifiers:
EaU6JR2nmwyZ-i0d8JZAoTNZH3ULvYAfSVPzhzS6b5CMdid:webs:alice.example.com:aliceLegacy System Integration: Supporting systems that require specific identifier formats:
Implementers should follow these best practices:
Minimize Aliases: Create only necessary aliases to:
Consistent Naming: Use consistent patterns for alias creation:
did:webs paths when possibleRegular Auditing: Periodically review designated aliases:
Revocation Planning: Establish clear revocation procedures:
Documentation: Maintain comprehensive documentation:
Integrating designated aliases into existing systems requires careful planning:
Resolver Integration: DID resolvers must:
did:keri and did:webs methodsalsoKnownAs relationships correctlyWallet Support: Digital wallets should:
Verifier Implementation: Verifiers must:
Key Management: Key management systems should:
Monitoring and Alerting: Operational systems should:
The designated aliases mechanism provides a powerful tool for bridging KERI's cryptographic security with the practical needs of diverse identifier ecosystems, enabling organizations to maintain strong security properties while supporting multiple identifier formats and use cases.
Complete Chain Verification: Verifiers must validate the entire chain:
keri.cesr)Caching Considerations: Implement intelligent caching:
Error Handling: Implement robust error handling:
Key Management: All designated aliases share the same underlying key material. Compromise of the primary AID's keys compromises all aliases. Implement:
Revocation Procedures: When revoking a designation:
alsoKnownAsDuplicity Detection: Monitor for duplicity in both KEL and TEL:
Batch Operations: When managing multiple aliases:
Witness Selection: Choose witnesses strategically:
Resolution Optimization: For high-volume systems:
Test Coverage: Implement comprehensive tests:
Integration Testing: Test with real infrastructure:
Security Testing: Conduct security assessments: