Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 41 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
An operational mode in KERI where validators rely on witnessed Key Event Receipt Logs (KERLs) as a secondary root-of-trust to verify identifier events, enabling high availability and one-to-many interactions even when the identifier controller is offline or not directly communicating with validators.
Indirect mode is one of two fundamental operational trust modalities in the KERI protocol, distinguished by its reliance on witnessed key event receipt logs (KERL) as a secondary root-of-trust for event validation. This architectural approach enables validators to verify the authenticity and integrity of key events for an AID (Autonomic Identifier) without requiring direct, synchronous communication with the identifier's controller.
The defining characteristic of indirect mode is its support for high availability scenarios where the controller may be intermittently connected or completely offline. By distributing the responsibility for event promulgation to a designated set of witnesses, the system ensures that validators can access and verify the complete key event log history at any time, regardless of the controller's network presence.
Indirect mode is specifically architected for:
The term "KERI" itself (Key Event Receipt Infrastructure) derives from this indirect mode's reliance on , representing a core architectural innovation that enables trustworthy event validation without requiring direct controller presence.
Implementing indirect mode requires careful witness selection. Controllers should:
Witness implementations must:
Validators in indirect mode should:
Traditional identity systems have struggled with the availability-security trade-off. Centralized systems like DNS/CA achieve high availability through hierarchical infrastructure but create single points of failure and require trust in administrative authorities. Blockchain-based systems attempt decentralization but suffer from scalability limitations and require all participants to maintain consensus on a shared ledger.
The concept of witness-based verification has roots in distributed systems theory, particularly in Byzantine Fault Tolerant consensus algorithms. However, traditional BFT systems require all participants to agree on a total ordering of all events across all identifiers, creating significant overhead.
KERI's indirect mode represents an evolution of these concepts by:
In KERI's indirect mode, the controller designates a set of witnesses when creating an identifier through the inception event. These witnesses are trusted components that:
The witness set is controller-managed and transferable - the controller can rotate witnesses through rotation events, maintaining control over the infrastructure supporting their identifier.
Security guarantees in indirect mode are provided through KA2CE (KERI's Agreement Algorithm for Control Establishment), which orchestrates consensus among the designated witness set. The algorithm ensures that:
Indirect mode provides validators with three critical capabilities:
All three capabilities depend on the validator's ability to replay the complete sequence of key events (the key event history or log) for a given identifier. Indirect mode ensures this replay capability remains available through the witnessed KERL infrastructure.
The indirect mode trust model is carefully structured:
Critically, witnesses do not control the identifier - they only attest to events they've observed. The controller's signatures remain the authoritative proof of control. This separation prevents witnesses from hijacking identifiers while still providing the availability benefits of distributed infrastructure.
Indirect mode relies on OOBI (Out-Of-Band Introduction) for discovery of witness endpoints. An OOBI provides the initial association between an AID and the network locations of its witnesses. After this bootstrap introduction, all subsequent verification occurs through KERI's cryptographic mechanisms.
The system supports percolated discovery where:
Indirect mode achieves nearly continuous availability through:
This architecture enables mobile and web-based controllers with intermittent connectivity to maintain persistent, verifiable identifiers that remain accessible to validators even when the controller is offline.
Enterprise Identity: Organizations issuing verifiable credentials need identifiers that remain available for verification even when internal systems are offline or undergoing maintenance. Indirect mode enables credential verifiers to validate credentials at any time by querying the issuer's witness infrastructure.
Mobile Applications: Smartphone-based identity wallets cannot maintain continuous network connectivity. Indirect mode allows these wallets to create events when online, with witnesses ensuring the event history remains available to verifiers even when the phone is offline.
Public Services: Businesses and services building reputation in persistent identifiers benefit from the high availability guarantees of indirect mode. Customers can verify the service's identity and credentials without requiring the service to be directly reachable.
Regulatory Compliance: Systems like vLEI (verifiable Legal Entity Identifier) require high availability for credential verification while maintaining cryptographic security. Indirect mode provides the infrastructure for GLEIF and Qualified vLEI Issuers to issue credentials that remain verifiable through witness networks.
Availability Without Centralization: Indirect mode achieves high availability without requiring centralized infrastructure or trusted third parties. Each identifier has its own witness set, avoiding single points of failure.
Scalability: By localizing consensus to individual identifiers rather than requiring global agreement, indirect mode scales to support arbitrary numbers of identifiers without coordination overhead.
Flexibility: Controllers can choose their own witnesses, rotate witness sets, and adjust security parameters (like TOAD thresholds) based on their specific requirements.
Cryptographic Security: Despite relying on witnesses for availability, indirect mode maintains KERI's strong cryptographic guarantees. Witnesses cannot forge events or hijack identifiers - they can only attest to events they've observed.
Ambient Verifiability: The witnessed KERL structure enables anyone to verify identifier state at any time, supporting zero-trust computing models where verification doesn't depend on infrastructure security.
Infrastructure Requirements: Indirect mode requires maintaining witness infrastructure, either self-hosted or through third-party witness services. This adds operational complexity compared to direct mode.
Trust Assumptions: While witnesses don't control identifiers, validators must trust that witnesses are honestly reporting events and not colluding to hide duplicity. The TOAD threshold and witness selection become critical security parameters.
Latency: Event establishment in indirect mode requires witness consensus, introducing latency compared to direct peer-to-peer communication. The time for events to be witnessed and receipts to be collected affects how quickly key state changes become authoritative.
Attack Surface: Indirect mode presents different attack surfaces compared to direct mode, particularly regarding availability attacks on witness infrastructure and consistency attacks through witness collusion. The protocol's mitigation properties are mode-specific.
Complexity: The witness consensus mechanism, KERL structure, and discovery protocols add complexity to implementations. Developers must understand witness selection, TOAD configuration, and OOBI resolution to properly deploy indirect mode systems.
The KERI specification explicitly notes that direct and indirect modes have different attack surfaces for availability and consistency. Indirect mode's security depends on:
Validators must assess these factors when deciding whether to trust identifiers operating in indirect mode, potentially requiring higher witness thresholds or additional verification for high-stakes interactions.
Indirect mode contrasts with direct mode, which supports intermittent availability through direct controller-validator communication. The choice between modes represents a fundamental design decision:
Direct Mode: Suitable for peer-to-peer scenarios, mobile devices with intermittent connectivity, and situations where maintaining witness infrastructure is impractical.
Indirect Mode: Appropriate for public services, enterprise applications, credential issuers, and any scenario requiring high availability or one-to-many interactions.
Many KERI deployments use both modes - direct mode for peer-to-peer interactions and indirect mode for public-facing identifiers. The protocol's flexibility allows controllers to choose the appropriate mode for each identifier based on its intended use case.
Production deployments should monitor: