Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 169 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
Loci-of-control refers to the separation of control authority in KERI between the controller's ability to promulgate authoritative key events (Key Event Promulgation Service) and the validator's independent ability to confirm those events (Key Event Confirmation Service), eliminating the need for shared governance over consensus infrastructure.
Loci-of-control (plural of locus-of-control) represents the fundamental architectural principle in KERI that separates control authority into distinct, independent spheres of operation. The term originates from psychology, where "locus of control" describes the degree to which individuals believe they control outcomes versus external forces. In KERI's context, it describes who controls what in the identifier ecosystem—specifically, the separation between the controller's authority to create and publish key events versus the validator's authority to independently verify and accept those events.
This separation is not merely organizational but represents a fundamental design choice that distinguishes KERI from blockchain-based and federated identity systems. By establishing two separate loci-of-control—one belonging to the controller and another to the validator—KERI eliminates the requirement for shared governance over consensus node pools, a major limitation of traditional distributed consensus algorithms.
The concept of loci-of-control was introduced to the Self-Sovereign Identity (SSI) domain by Tim Bouma in 2019, establishing foundational thinking about how control authority should be distributed in decentralized identity architectures. This work addressed a critical question: in systems without central authorities, how should control be allocated to maintain both security and autonomy?
Traditional identity systems typically concentrate control in single entities:
These centralized or collectively-governed approaches create dependencies, coordination overhead, and potential attack surfaces. The loci-of-control framework provided a theoretical foundation for understanding how control could be distributed while maintaining system integrity.
While loci-of-control is primarily an architectural principle rather than a specific implementation detail, understanding its implications is critical for system design:
When implementing controller functionality:
When implementing validator functionality:
When designing KERI-based systems:
When establishing governance for KERI ecosystems:
KERI implements loci-of-control through two architecturally separate services that operate from different perspectives:
This service operates from the controller's point of view and represents the controller's locus-of-control. The controller:
The controller has complete sovereignty over their identifier's key event history. No external party can force the controller to create, modify, or suppress events. This represents true autonomic control—the identifier is self-managing and self-governing.
This service operates from the validator's point of view and represents the validator's locus-of-control. The validator:
Validators operate independently without requiring coordination with other validators. Each validator makes their own determination of whether to accept events, without participating in consensus mechanisms or governance structures.
The separation of promulgation and confirmation into two separate loci-of-control fundamentally simplifies the interaction space between controllers and validators. This design removes one of the major drawbacks of total ordered distributed consensus algorithms: the requirement for shared governance over the pool of nodes that provide the consensus algorithm.
In blockchain-based identity systems:
In KERI's separated loci-of-control model:
The KERI Agreement Algorithm for Control Establishment (KA2CE) serves as the primary mechanism protecting the controller's locus-of-control. KA2CE's purpose is to protect the controller's ability to promulgate the authoritative copy of its key event history despite external attack.
Key protections include:
KA2CE does not require validators to participate in the algorithm—it operates entirely within the controller's locus-of-control to ensure promulgation integrity.
The separated loci-of-control enables true operational independence:
Controllers can:
Validators can:
The architectural separation provides multiple security benefits:
Attack Resistance: Controllers maintain control over promulgation even under attack. An attacker cannot force a controller to create malicious events, and cannot prevent a controller from promulgating legitimate events (assuming sufficient witness availability).
Availability Guarantee: Validators can obtain authoritative copies on demand. The system is designed so that validators don't need to be online continuously—they can retrieve the current key state whenever needed.
No Single Point of Governance Failure: Unlike systems with shared governance, there is no governance structure that can be captured, corrupted, or disputed. Each party operates within their own sphere of authority.
Clear Accountability Boundaries: The separation creates clear lines of responsibility. Controllers are accountable for the events they promulgate. Validators are accountable for their verification decisions. There is no ambiguity about who controls what.
Traditional identity systems conflate these loci-of-control:
Certificate Authority Systems:
Blockchain Systems:
Federated Systems:
KERI's separation enables truly autonomic identifiers that operate independently of external coordination mechanisms or shared governance structures.
The loci-of-control separation has profound scalability implications:
No Global Consensus Required: Validators don't need to reach consensus with each other, eliminating the coordination bottleneck that limits blockchain throughput.
Parallel Verification: Multiple validators can verify the same identifier simultaneously without coordination, enabling horizontal scaling.
Independent Validator Networks: Different applications can use different validator networks without interoperability issues, as all are verifying the same authoritative KEL.
Asynchronous Operation: Controllers and validators don't need to be online simultaneously, enabling truly asynchronous identity operations.
By eliminating shared governance requirements, KERI enables:
This represents a fundamental shift from "governance by committee" to "governance by cryptography," where the protocol itself enforces the separation of concerns rather than relying on organizational structures.
Loci-of-control is intimately connected to KERI's other foundational concepts:
Root-of-Trust: The controller's locus-of-control is grounded in the cryptographic root-of-trust established by self-certifying identifiers. The validator's locus-of-control is grounded in their ability to independently verify this root-of-trust.
Source-of-Truth: The controller is the authoritative source-of-truth for their key event history. Validators independently verify this source-of-truth without requiring external confirmation.
Autonomic Identifiers: The separation of loci-of-control is what makes identifiers truly "autonomic"—self-managing and self-governing without external dependencies.
Together, these three concepts (root-of-trust, source-of-truth, loci-of-control) form what KERI documentation calls the RSL triad—the foundational principles that enable truly decentralized, self-sovereign identity.