Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 53 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
Identity assurance is the process by which a trusted third-party organization verifies and establishes confidence in the identity of an entity (individual or organization) through rigorous verification procedures, providing reputational trust that complements KERI's cryptographic attributional trust.
Identity assurance represents the "heavy-lifting" work performed by trusted intermediary organizations to establish and verify the identity of entities—whether individuals or legal organizations—through comprehensive verification procedures. This process creates reputational trust by having an authoritative third party vouch for an entity's identity based on evidence validation, document verification, and established governance procedures.
The core properties of identity assurance include:
Identity assurance establishes the scope and boundaries of what can be trusted about an entity's identity claims. It answers questions like "Is this person who they claim to be?" and "Does this organization legally exist with the claimed attributes?" However, it does not inherently provide cryptographic proof of control over digital identifiers—that is the domain of attributional trust.
Identity assurance emerged from traditional identity verification practices in physical contexts—government-issued identification documents, notarization services, and institutional verification procedures. As digital systems evolved, the need for standardized identity assurance frameworks became critical.
The NIST SP 800-63-3 standard formalized identity assurance into three levels:
The vLEI Ecosystem Governance Framework mandates specific identity assurance procedures:
Minimum Identity Assurance Level 2 (IAL2) is required for individual representatives, which includes:
Accepted high-assurance digital identity schemes include:
Even when using IAL2, vLEI governance requires supervised real-time sessions that effectively incorporate IAL3 requirements:
For organizational credentials with multi-sig requirements:
Legal Entity Verification:
Individual Representative Verification:
Identity assurance status changes trigger grace periods:
Traditional implementations relied heavily on centralized identity providers, certificate authorities, and government agencies. These systems created trust through institutional reputation but introduced single points of failure, privacy concerns, and interoperability challenges.
In the organizational identity space, systems like the Legal Entity Identifier (LEI) established global standards for identifying legal entities. GLEIF (Global Legal Entity Identifier Foundation) emerged as the authoritative body managing the LEI system, providing identity assurance for organizations worldwide.
KERI fundamentally distinguishes between two complementary trust models:
Attributional trust is what KERI provides through cryptographic mechanisms:
Reputational trust is what identity assurance provides:
KERI's documentation explicitly states: "You can't have reputation without attributional trust" and "In the real world you need both." This acknowledges that while KERI solves the cryptographic attribution problem, identity assurance remains necessary for establishing the real-world identity behind the cryptographic identifiers.
The verifiable LEI (vLEI) ecosystem demonstrates how KERI and identity assurance work together:
GLEIF's Role: GLEIF performs identity assurance for legal entities, verifying:
KERI's Role: KERI provides the cryptographic infrastructure:
The vLEI governance frameworks mandate specific identity assurance procedures:
For Legal Entities:
For Individual Representatives:
The KERI documentation carefully distinguishes:
Out-of-band procedures for identity assurance:
These are complementary but distinct mechanisms serving different trust requirements.
Identity assurance is essential in scenarios where:
Regulatory Compliance: Financial services, healthcare, and government systems require verified identities to comply with KYC (Know Your Customer), AML (Anti-Money Laundering), and data protection regulations.
High-Stakes Transactions: Real estate transfers, corporate mergers, and large financial transactions require confidence in counterparty identities beyond cryptographic proof of control.
Legal Accountability: Contracts and legal agreements require verified identities that can be held accountable in legal systems.
Organizational Representation: Verifying that individuals are authorized to act on behalf of organizations requires identity assurance of both the organization and the individual's role.
Trust Establishment: Provides human-understandable trust based on institutional reputation rather than requiring technical understanding of cryptographic proofs.
Regulatory Acceptance: Meets legal and regulatory requirements that mandate identity verification by trusted parties.
Fraud Prevention: Reduces identity fraud through rigorous verification procedures and institutional accountability.
Interoperability: Standardized assurance levels (IAL1/2/3) enable consistent trust decisions across different systems and jurisdictions.
Liability Framework: Trusted parties assume liability for verification quality, providing recourse in case of errors.
Centralization Risk: Reliance on trusted third parties creates potential single points of failure and control.
Privacy Concerns: Identity assurance often requires disclosure of sensitive personal information to verifying organizations.
Cost and Friction: Rigorous identity verification procedures are expensive and time-consuming compared to self-sovereign approaches.
Scalability Challenges: Manual verification processes don't scale efficiently to global digital systems.
Temporal Validity: Identity assurance is point-in-time; attributes may change, requiring re-verification.
The optimal approach combines both trust models:
This architecture enables:
Assurance Level Selection: Organizations must determine appropriate IAL levels based on risk assessment and regulatory requirements.
Verification Procedures: Standardized procedures ensure consistent quality across different verifiers and jurisdictions.
Credential Lifecycle: Identity assurance must be maintained through credential issuance, renewal, and revocation processes.
Multi-Signature Requirements: For organizational credentials, identity assurance must extend to all authorized signers in multi-sig configurations.
Grace Periods: vLEI governance frameworks include grace periods (e.g., 90 days) to manage transitions when identity assurance status changes.
Identity assurance remains a critical component of comprehensive digital identity systems, providing the reputational trust foundation upon which KERI's cryptographic attributional trust can build verifiable, scalable, and privacy-preserving identity solutions.