Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 12 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
A governance document published by GLEIF that establishes the requirements, policies, and procedures for issuing vLEI Role Credentials to individuals representing Legal Entities in functional or engagement-specific contexts (rather than official organizational roles), enabling cryptographically verifiable authorization for context-specific activities.
The Legal Entity Engagement Context Role (ECR) vLEI Credential Governance Framework is an official governance document within the vLEI Ecosystem Governance Framework that specifies the comprehensive requirements for issuing vLEI Role Credentials to individuals representing Legal Entities in non-official functional or engagement contexts.
According to Document 5, this framework is a Controlled Document published under the authority of the Global Legal Entity Identifier Foundation (GLEIF) and released under a Creative Commons Attribution license. The framework operates within a hierarchical governance structure where it applies policies "in addition to" the Core Policies defined in the overarching vLEI Ecosystem Governance Framework.
Official Abbreviations:
Canonical Definition: A document that details the requirements for issued to representatives of a Legal Entity in other than official roles but in functional or other context of engagement.
Organizations implementing ECR credential programs under this governance framework should:
Establish Clear Role Definitions: Distinguish between official organizational roles (requiring OOR credentials) and functional/engagement roles (requiring ECR credentials)
Define Engagement Contexts: Clearly specify the functional contexts, projects, or engagements for which ECR credentials will be issued
Implement Authorization Workflows: Establish internal processes for AVRs to request and manage ECR credential issuance and revocation
Maintain Credential Registries: Track issued ECR credentials and their associated engagement contexts for audit and compliance purposes
Legal Entities selecting QVIs for ECR credential services should:
Verify QVI Qualification: Confirm the QVI holds a valid Qualified vLEI Issuer credential from GLEIF
Review Service Level Agreements: Ensure SLAs cover issuance timing, revocation procedures, and TEL maintenance
Assess Technical Capabilities: Verify the QVI's KERI infrastructure, witness pools, and security practices
Establish Pricing Models: Understand fee structures for credential issuance, maintenance, and revocation
Legal Entities implementing direct ECR credential issuance should:
Deploy KERI Infrastructure: Establish witness pools, watchers, and TEL backers for credential status tracking
Implement Security Controls: Protect private keys using HSMs or other secure key management systems
Establish Operational Procedures: Define processes for credential lifecycle management, including issuance, renewal, and revocation
Maintain Compliance: Ensure ongoing compliance with governance framework requirements and GLEIF policies
Implementations must respect:
Graduated Disclosure Policies: Only request and disclose credential attributes necessary for specific interactions
Chain-link Confidentiality Obligations: Ensure all verifiers understand and accept confidentiality obligations before credential disclosure
Data Minimization: Limit credential attribute scope to what is necessary for the engagement context
The ECR vLEI Credential Governance Framework occupies a specific position within the broader vLEI ecosystem governance architecture:
Hierarchical Structure:
GLEIF serves as both the Governing Authority and Administering Authority for the entire vLEI ecosystem, as established in Document 10. GLEIF operates with LEI 506700GE1G29325QX363 and maintains ultimate oversight over all credential types, including ECR credentials.
The ECR framework interacts with several key governance entities:
Qualified vLEI Issuers (QVIs): Organizations qualified by GLEIF to issue ECR vLEI Credentials as a value-added service to Legal Entities. According to Document 5, QVIs provide credential issuance operations under delegation from GLEIF.
Legal Entities: Organizations holding valid Legal Entity vLEI Credentials that contract with QVIs for ECR credential issuance services.
Authorized vLEI Representatives (AVRs): Representatives of Legal Entities authorized to request issuance and revocation of ECR vLEI Credentials on behalf of their organizations.
A critical governance distinction exists between the ECR framework and the Legal Entity Official Organizational Role (OOR) vLEI Credential Governance Framework:
OOR Credentials: Address individuals in formal, official organizational positions within a Legal Entity's hierarchy (e.g., CEO, CFO, Board Members).
ECR Credentials: Target individuals serving in functional or engagement-specific contexts rather than official organizational roles (e.g., project managers, consultants, engagement-specific representatives).
This distinction enables Legal Entities to issue verifiable credentials for context-specific activities without requiring formal organizational appointments.
According to Document 5, the primary purpose of the ECR vLEI Credential is to enable "simple, safe, secure identification" of ECR vLEI Credential Holders to any Verifier that accepts this credential type.
Core Objectives:
Document 5 defines a dual issuer model with two distinct qualification paths:
Path 1: QVI-Mediated Issuance
Path 2: Direct Legal Entity Issuance
Issuer Obligations:
An Engagement Context Role (ECR) person is an individual who:
Holder Responsibilities:
The framework explicitly limits its scope to three key stakeholder categories: Issuers, Holders, and Verifiers of ECR vLEI Credentials.
Verifier Responsibilities:
The framework establishes clear delegation of issuance authority:
GLEIF → QVIs: GLEIF delegates credential issuance authority to QVIs through the QVI vLEI Credential
QVIs → Legal Entities: QVIs provide issuance services to Legal Entities under contractual arrangements
Legal Entities → ECR Persons: Legal Entities authorize specific individuals for engagement contexts through ECR credential issuance
This delegation model enables horizontal and vertical scalability as described in Document 10, supporting unlimited levels of delegated identifiers.
According to Document 5, revocation authority follows the issuance chain:
The framework explicitly limits ECR credentials to non-official roles. ECR credentials:
Binding to Holder Principle: Document 5 establishes that ECR vLEI Credentials must provide a "strong enough binding" to the ECR vLEI Credential Holder such that a Proof Request can be satisfied only by the Legal Entity vLEI Credential or the ECR Person. This ensures cryptographic non-transferability.
Context Independence Principle: The credential must fulfill Proof Requests "regardless of context, including in-person, online, or over the phone," ensuring universal applicability.
The ECR credential issuance process follows the Issuance and Presentation Exchange (IPEX) protocol:
For QVI-Mediated Issuance:
For Direct Legal Entity Issuance:
According to Document 10, all vLEI issuers must verify AID control by holders:
The issuer creates an ACDC credential containing:
Required Fields:
Optional Fields:
The issuer signs the credential using their AID's current signing keys, creating a non-repudiable cryptographic commitment.
The issuance event is anchored to the issuer's Key Event Log (KEL) and registered in a Transaction Event Log (TEL) for status tracking.
The credential is delivered to the ECR person through secure channels, typically using OOBI for initial discovery and KERI protocols for secure transmission.
Verifiers validate ECR credentials through a multi-step process:
Document 5 establishes several conditions under which ECR credentials must or may be revoked:
vLEI Ecosystem Governance Framework v3.0 (Document 10)
KERI (Key Event Receipt Infrastructure) Specification
ACDC (Authentic Chained Data Container) Specification
CESR (Composable Event Streaming Representation) Specification
IPEX (Issuance and Presentation Exchange) Specification
vLEI Ecosystem Information Trust Policies
GLEIF Accreditation Policies
While this is a governance document rather than a technical specification, understanding the underlying technical infrastructure is essential for implementing ECR credential systems:
ECR credentials rely on KERI infrastructure for:
Autonomic Identifiers (AIDs): Self-certifying, self-sovereign identifiers that provide cryptographic root-of-trust
Key Event Logs (KELs): Append-only, verifiable logs of key events that establish identifier control authority
Witnesses: Designated entities that verify, sign, and maintain key events, providing distributed consensus
Watchers: Entities that monitor KELs for duplicity in promiscuous mode, enabling ambient duplicity detection
ECR credentials are implemented as ACDCs, which provide:
Self-Addressing Identifiers (SAIDs): Content-addressable identifiers that bind credential content cryptographically
Chaining: Cryptographic links to parent credentials (Legal Entity vLEI Credentials)
Graduated Disclosure: Progressive revelation of credential attributes based on verifier requirements
Selective Disclosure: Ability to disclose specific attributes while keeping others private
ECR credential status is tracked through TELs:
Management TEL: Tracks the registry of credential issuers and their authorization
Virtual Credential TEL: Tracks individual credential issuance and revocation events
Backers: Entities that maintain TEL state, potentially using distributed ledger technology
ECR credential discovery uses OOBI (Out-Of-Band Introduction):
OOBI Protocol: Enables discovery and validation of IP resources for KERI AIDs
Percolated Discovery: Bootstrap mechanism enabling scalable, zero-trust discovery
Witness Pools: Collections of witnesses available for AID services
The ECR vLEI Credential Governance Framework represents an evolving governance model that adapts to emerging use cases and technical capabilities:
Document 5 represents version 0.12 dated November 23, 2022, indicating ongoing refinement before v1.0 publication.
The framework positions ECR credentials within the broader context of:
Trust over IP (ToIP) Foundation: Layer Four Ecosystem Governance Framework
Self-Sovereign Identity (SSI): Decentralized identity architecture principles
Decentralized Identifiers (DIDs): Potential integration with DID methods like did:keri and did:webs
The framework supports unlimited scalability through:
Delegation: Hierarchical delegation enabling organizational complexity
Multi-tenancy: Multiple delegates from single delegators
Nested Delegation: Arbitrary depth delegation trees
This governance framework establishes the foundation for a globally scalable, cryptographically verifiable system for engagement context role authorization, enabling Legal Entities to operate with flexibility while maintaining strong security and auditability.
Consent Management: Obtain and document ECR person consent for credential issuance and disclosure