Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 43 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
A registrar is an identifier that serves as a backer for transaction event logs (TELs), providing witnessing and verification services for lifecycle events. Registrars are analogous to witnesses in KELs but operate specifically within the infrastructure for tracking credential issuance and states.
A registrar in the KERI ecosystem is an AID (Autonomic Identifier) that functions as a backer for transaction event logs (TELs). Registrars provide secondary root-of-trust services specifically for credential lifecycle management, operating within the public verifiable credential registry infrastructure.
Registrars accomplish several critical functions:
Registrars are employed when:
The registrar process involves:
The registrar process begins with the creation of a management TEL:
For each credential issued:
The list of registrars can be updated:
When a verifier needs to check credential state:
Registrars must satisfy several cryptographic constraints:
Identifier Type: According to Document 30, registrars should use non-transferable AIDs (ephemeral identifiers) for their own identity. This design choice means registrar security relies on pool-based threshold structures rather than individual key rotation capabilities.
Cryptographic Strength: All registrar key-pairs must provide approximately 128 bits of cryptographic strength. Compliant algorithms include:
Ed25519 for digital signaturesEcDSASecp256k1 for ECDSA-based signaturesSignature Verification Infrastructure: Registrars must implement robust signature verification for:
When registrars use distributed ledger technology (DLT) for TEL storage:
Approved DID Methods: According to Document 30, registrars must use GLEIF Approved DID Methods when operating as ledger backers. Approval is required down to the individual ledger implementation level, not just the DID method specification.
Single Registrar Recommendation: The specification states registrars should use only one Registrar per KEL when using ledger-based backing to maintain consistency and avoid synchronization complexity.
Ledger-Specific Security: Each ledger implementation must provide appropriate security guarantees for the use case, including:
When registrars operate as traditional KERI witnesses (non-ledger mode):
Minimum Pool Size: Must use a minimum pool of 5 witnesses with KAACE (KERI's Agreement Algorithm for Control Establishment) sufficient majority threshold.
Access Control Independence: Registrars should use access control independent of the Controller keys for:
Discovery Mechanisms: Registrars must publish their endpoints through multiple channels:
Event Queuing: According to Document 29, registrars should implement event queuing mechanisms that operate during a period of time to allow several block confirmations as a safety measure. This is particularly critical for ledger-based registrars to protect against blockchain reorganizations.
Confirmation Delays: The queuing system should wait for sufficient confirmations before events are considered stably anchored, protecting against:
Registrars must handle several error conditions:
Duplicity Detection: If a registrar receives conflicting TEL events for the same credential, it must:
KEL Validation Failures: If TEL events cannot be validated against their anchoring KEL:
Network Partitions: During network partitions:
Enterprise Credential Issuance: In the vLEI ecosystem, QVIs use registrars to track the lifecycle of:
The registrar infrastructure enables verifiers to check credential validity without contacting the issuer directly, improving scalability and privacy.
Supply Chain Credentials: Organizations issuing supply chain credentials use registrars to:
Educational Credentials: Educational institutions use registrars to:
Registrar Selection: When choosing registrars:
Registrar Pool Management: For optimal security and availability:
Privacy Considerations: When privacy is important:
Ledger Integration: When using ledger-based registrars:
KERI Agent Integration: When integrating registrars with KERIA (KERI Agent):
Witness Infrastructure Reuse: Registrars can leverage existing witness infrastructure:
Discovery Protocol Integration: Registrars should integrate with:
Credential Presentation Workflows: During credential presentation:
Registrars represent a parallel infrastructure component to the backer/witness model used in KELs, adapted specifically for transaction event logs that track credential issuance and revocation states. This architectural parallelism means:
The separation between KEL and TEL infrastructure allows:
This design reflects KERI's broader philosophy of creating composable, modular infrastructure where each component serves a specific purpose while maintaining interoperability through standardized protocols and cryptographic verification mechanisms.
Registrars should use non-transferable AIDs for their own identifiers. This design choice means registrar security relies on pool-based threshold structures rather than individual key rotation. Implementers must:
Implement KAACE (KERI's Agreement Algorithm for Control Establishment) for registrar pools:
When implementing ledger-based registrars:
Registrars must be discoverable through multiple mechanisms:
/.well-known/keri/oobi/[registrar-AID])For production deployments:
Ensure compatibility with the broader KERI ecosystem:
Comprehensive testing should include:
Production registrars should monitor: