Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 10 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
The locked-state is the default security posture of a KERI data store immediately upon creation. When a KERI keystore is initialized using a passcode, it automatically enters this locked-state, meaning:
The locked-state is fundamental to KERI's key management security model. Unlike traditional systems where encryption might be optional, KERI keystores implement a "secure by default" approach:
When a controller creates a new KERI identity:
The locked-state is not merely a feature but a mandatory security requirement in KERI implementations:
While the KERI specification does not mandate specific encryption algorithms, implementations typically use:
Implementations must balance security with usability:
In cloud-based KERI services like KERIA:
The locked-state model requires careful consideration of passcode loss:
The locked-state represents a fundamental security primitive that ensures KERI's cryptographic material remains protected at rest, implementing defense-in-depth alongside the protocol's cryptographic guarantees.
The locked-state protects critical KERI components:
The locked-state implements a clear security boundary:
This model ensures that even if an attacker gains file system access to the KERI data store, the cryptographic material remains protected by encryption. The passcode serves as the root-of-trust for accessing the keystore, distinct from the cryptographic root-of-trust provided by the self-certifying nature of the AID itself.
The locked-state is particularly critical for custodial agents and cloud-based KERI services, where the keystore may reside on shared infrastructure but must maintain confidentiality through encryption.