Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 196 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
A representative of GLEIF (Global Legal Entity Identifier Foundation) authorized to perform identity verification requirements needed to issue QVI (Qualified vLEI Issuer) vLEI Credentials within the vLEI ecosystem governance framework.
A GLEIF Authorized Representative (GAR) is formally defined in the vLEI Ecosystem Governance Framework v1.0 Glossary (December 2022) as:
"A representative of GLEIF authorized to perform the identity verifications requirements needed to issue the QVI vLEI Credential."
The official abbreviation is GAR, and this role is fundamental to the bootstrapping of trust in the verifiable Legal Entity Identifier (vLEI) ecosystem. GARs serve as GLEIF's operational representatives who execute the critical function of qualifying and authorizing Qualified vLEI Issuers (QVIs), thereby establishing the initial trust anchor from which all subsequent vLEI credentials derive their authority.
The GAR role occupies a critical position in the vLEI ecosystem's hierarchical trust structure:
GLEIF Root of Trust → GLEIF Delegated AIDs → GAR Operations → QVI Authorization → Legal Entity Credentials
GLEIF, as the Global Legal Entity Identifier Foundation, operates the Global LEI System (GLEIS) and serves as both the Governing Authority and Administering Authority for the vLEI ecosystem. Within this structure, GARs act as GLEIF's authorized agents who operationalize the trust delegation from GLEIF to QVIs.
The governance framework distinguishes between two types of GARs based on their operational scope:
Multi-Signature Coordination: GARs must coordinate with other GAR group members to achieve signing thresholds for GEDA operations. This requires secure communication channels and coordination protocols to ensure timely approval of QVI operations.
Identity Verification Compliance: GARs must maintain detailed records of all identity verification sessions, including video recordings, challenge-response logs, and verification documentation to demonstrate governance compliance.
Key Management: GARs must protect their private keys using appropriate security measures (HSMs, TEEs, or secure key stores) as specified in the KERI Infrastructure Technical Requirements.
Witness Configuration: The GEDA must be configured with appropriate witness pools to ensure duplicity detection and high availability of the GAR-controlled identifier.
Governance Monitoring: GARs should implement monitoring systems to track QVI qualification status, LEI validity, and compliance with governance requirements to enable timely credential revocation when necessary.
KERI Protocol Compliance: All GAR operations must comply with KERI protocol specifications, including proper event sequencing, signature attachment, and witness coordination.
ACDC Schema Compliance: QVI vLEI Credentials issued by GARs must conform to the official JSON Schema hosted in the GLEIF-IT/vLEI-schema repository.
CESR Encoding: All cryptographic primitives used in GAR operations must use CESR (Composable Event Streaming Representation) encoding for interoperability.
Delegation Ceremony: GARs must follow proper KERI delegation ceremonies when approving QVI AID inception and rotation events, ensuring cryptographic proof of authorization is recorded in the GLEIF KEL.
External GARs: Manage the GLEIF External Delegated AID (GEDA) and interact with external ecosystem participants, specifically QVIs. External GARs are responsible for:
Internal GARs: Manage the GLEIF Internal Delegated AID (GIDA) for GLEIF's internal operations and infrastructure management.
The distinction ensures separation of concerns between GLEIF's internal operations and its external-facing authorization functions.
GARs operate within a KERI-based infrastructure where:
1. Identity Verification and Assurance
GARs must perform rigorous identity verification of QVI Authorized Representatives (QARs) before authorizing QVI credential issuance. This verification process includes:
The identity verification workflow requires GARs to:
2. QVI Delegation Approval
GARs approve the creation and management of QVI delegated AIDs through KERI delegation mechanisms:
Inception Approval: When a QVI establishes its group multisig AID, GARs must:
Rotation Approval: When QVIs rotate their group multisig keys or change membership:
kli delegate confirm --alias "GLEIF External AID" --interact commands3. QVI vLEI Credential Issuance
GARs issue QVI vLEI Credentials to qualified issuers, which serve as the authorization mechanism enabling QVIs to issue downstream credentials including:
The QVI vLEI Credential is an ACDC (Authentic Chained Data Container) that cryptographically binds the QVI's identity to GLEIF's authorization, creating a verifiable chain of trust.
4. Multi-Signature Group Coordination
GARs operate as part of a multi-signature group controlling the GEDA. This requires:
GARs possess specific authorities within the vLEI ecosystem:
Authorization Authority: GARs have the exclusive authority to authorize QVIs by issuing QVI vLEI Credentials. This authorization is cryptographically verifiable through the ACDC credential structure and the KERI delegation chain.
Delegation Control: Through their control of the GEDA, GARs can approve or reject QVI delegated AID operations, including:
Governance Enforcement: GARs enforce compliance with the vLEI Ecosystem Governance Framework by:
GAR authority is bounded by specific constraints:
Scope Limitation: GARs authorize QVIs but do not directly issue credentials to Legal Entities or individuals. The authorization chain is: GLEIF → GAR → QVI → Legal Entity → Individuals.
Governance Constraints: GARs must operate within the policies defined by the vLEI Ecosystem Governance Framework and cannot unilaterally modify governance rules.
Multi-Signature Requirements: Individual GARs cannot act alone; all GEDA operations require coordination among multiple GARs to meet signing thresholds, ensuring no single GAR can compromise the system.
Qualification Dependency: GARs can only authorize entities that meet the QVI qualification requirements defined in the vLEI Issuer Qualification Agreement and associated governance documents.
The lifecycle of QVI authorization through GAR operations follows a structured process:
1. QVI Qualification Phase
2. Identity Verification Phase
3. Delegation Approval Phase
4. Credential Issuance Phase
Verifiers of QVI vLEI Credentials can cryptographically verify:
GARs may revoke QVI vLEI Credentials under specific conditions:
Qualification Failure: QVI fails Annual vLEI Issuer Qualification or does not remediate qualification issues.
LEI Status Change: The QVI's Legal Entity Identifier lapses or is retired, invalidating their authorization to issue vLEI credentials.
Governance Violations: QVI violates terms of the vLEI Issuer Qualification Agreement or vLEI Ecosystem Governance Framework policies.
Grace Period Management: QVI vLEI Credentials include a grace period to allow GLEIF to manage transitions when QVIs are terminated, enabling Legal Entities to contract with new QVIs without credential disruption.
Revocation is executed through the TEL registry, creating a verifiable record of the credential's status change.
vLEI Ecosystem Governance Framework v3.0 (2023-2025): The overarching governance document that establishes GLEIF's authority, defines stakeholder roles, and sets policies for the entire vLEI ecosystem.
GLEIF Identifier Governance Framework v1.0 (December 2022): Establishes the technical requirements and policies for GLEIF's Root AID and Delegated AIDs (GIDA and GEDA), including GAR operational procedures.
Qualified vLEI Issuer vLEI Credential Governance Framework v1.5 (April 2025): Defines the requirements, issuance procedures, and lifecycle management for QVI vLEI Credentials that GARs issue.
Legal Entity vLEI Credential Framework v1.4 (April 2025): Establishes requirements for credentials issued by QVIs to Legal Entities, defining the downstream trust chain that GARs enable.
Legal Entity Official Organizational Role vLEI Credential Framework v1.4 (April 2025): Governs OOR credentials issued by QVIs, part of the credential hierarchy GARs authorize.
Legal Entity Engagement Context Role vLEI Credential Framework v1.4 (April 2025): Governs ECR credentials issued by QVIs, completing the credential types GARs indirectly enable through QVI authorization.
vLEI Ecosystem Governance Framework Technical Requirements Part 1: KERI Infrastructure v1.3 (April 2025): Specifies the KERI protocol requirements for all vLEI ecosystem participants, including GAR operations with the GEDA.
vLEI Ecosystem Governance Framework Technical Requirements Part 2: vLEI Credentials v1.1 (December 2023): Defines technical specifications for ACDC credential structures, including QVI vLEI Credentials issued by GARs.
vLEI Issuer Qualification Agreement: The contractual agreement between GLEIF and QVIs that GARs enforce through credential issuance and revocation.
vLEI Issuer Qualification Program Checklist v1.0 (December 2022): The assessment tool GARs use to verify QVI qualification before authorization.
vLEI Ecosystem Information Trust Policies v1.2 (April 2025): Establishes security, privacy, and operational policies that GARs must enforce in their interactions with QVIs.
vLEI Ecosystem Governance Framework Risk Assessment v1.2 (December 2023): Identifies risks in the vLEI ecosystem, including risks related to GAR operations and QVI authorization.
vLEI Ecosystem Governance Framework Trust Assurance Framework v1.5 (April 2025): Maps governance requirements to ISO 20000 certification and other assurance mechanisms, including GAR operational controls.
GARs operate at the critical juncture where GLEIF's governance authority translates into operational trust infrastructure. Their role combines: