Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 186 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
In the KERI/ACDC ecosystem, identity refers to a unique entity that can be distinguished from all other entities through a collection of attributes or identity data. Identity is fundamentally relational and context-dependent - the same entity may have different identity representations maintained by different parties, each valid within their respective contexts.
Key characteristics:
KERI provides a cryptographic foundation for identity through Autonomic Identifiers (AIDs), which serve as self-certifying, self-managing identifiers that can represent identities without requiring centralized authorities. The KERI approach recognizes that:
Identity vs. Identifier Distinction: While identifiers are commonly used to represent identities, KERI's architecture separates the concept of identity (the entity itself) from the identifier (the reference to that entity). An provides cryptographic proof of control authority over an identifier, but the identity encompasses more than just the identifier - it includes the entity's , relationships, and contextual information.
KERI does not prescribe a single "identity" data structure. Instead, identity emerges from:
The vLEI Ecosystem Governance Framework establishes policies for:
KERI's approach to identity supports privacy through:
Decentralized Identity: KERI enables decentralized identity where entities establish control over identifiers through cryptographic key pairs rather than relying on centralized identity providers. This aligns with self-sovereign identity (SSI) principles where individuals and organizations maintain direct control over their digital identities.
Identity in ACDCs: Authentic Chained Data Containers (ACDCs) represent verifiable claims about identities. An ACDC contains:
The vLEI ecosystem demonstrates practical identity implementation, where Legal Entities receive verifiable credentials that cryptographically bind their organizational identity to their LEI (Legal Entity Identifier) through KERI infrastructure.
Identity Verification: The KERI ecosystem distinguishes between: