A setup process in KERI that establishes a new [AID](/concept/aid) (Autonomic Identifier) and configures authorization mechanisms for access control, typically involving the presentation of a vLEIcredential with scope-limited delegatable authority to prevent credential capture and misuse.
Related Concepts
No related concepts available
Comprehensive Explanation
registration-interaction
Source Context and Nature
Registration-interaction appears in KERI documentation as informal technical commentary rather than a formally specified process. The term emerged from technical discussions among KERI Suite core contributors (Samuel Smith, Daniel Hardman, and Lance Byrd) during a KERI Suite Zoom meeting on January 16, 2024 (discussion minutes 30-60). The available documentation explicitly characterizes these as exploratory notes with unresolved questions rather than settled specifications.
Basic Concept
The sources describe registration-interaction as a setup/registration interaction where:
Authorization is established to set up access control
A credential is presented (specifically a vLEI credential) as part of the process
The core concern articulated across sources is preventing credential capture and misuse during this presentation. The documentation suggests that narrowing scope to specific roles (exemplified as "Document Submitter") represents a form of pre-registration using delegatable authority.
Open Questions and Context Dependencies
Credential Delivery Requirements
Implementation Notes
Critical Implementation Considerations
Context-Dependent Security Requirements
The source documents repeatedly emphasize that security requirements for registration interactions are context-dependent rather than absolute. Implementers must:
Determine Governance Model: Identify whether the system operates under high-assurance, bearer-token, or other governance models
Assess Process Characteristics: Determine if registration is idempotent (resubmission has no effect) or non-idempotent
Configure Signature Requirements: Based on governance and process type, configure whether issuee signatures are required for credential presentation
Implement Appropriate Replay Protection: Match replay attack prevention strength to the risk context
Load Balancer Deduplication
The source documents specifically call out the need for load balancers to implement mechanisms to drop repeated requests. This is critical for preventing DDoS attacks through resubmission of valid registration requests. Implementation must:
Track request nonces or idempotency tokens within a time window
Drop duplicate requests before they reach application logic
Log dropped requests for security monitoring
Implement rate limiting per source or credential
Scope Limitation Through Delegation
The source documents emphasize narrowing credential scope to specific roles as a primary defense against credential capture and misuse. This is described as "pre-registration via delegatable authority." Implementers should:
Design role-based credential schemas with minimal privilege
Implement delegation mechanisms that allow scope limitation
Verify that presented credentials have appropriate scope for the registration context
Reject over-privileged credentials that exceed necessary scope
Credential as Bearer Token
The source documents frame credentials as functioning "like a bearer token," which has significant security implications:
Possession May Be Sufficient: In some governance models, simply possessing a valid credential is sufficient for authorization
Issuee Authentication Optional: Whether the presenter must prove they are the issuee depends on governance
Capture Risk: Bearer token characteristics create risk of credential capture and replay
The sources repeatedly emphasize that key implementation details depend on context rather than being universally specified. The most prominent unresolved question is:
Does the credential need to be delivered by the issuee?
The sources frame credentials as functioning "like a bearer token" where possession provides proof of authorization. However, multiple documents explicitly state: "Does the delivery require the issuee signature? Depends on the context."
This context-dependency means:
In some governance models, issuee signatures may be required for credential presentation
In other contexts, the credential itself may be sufficient for authorization
The specific requirements are determined by the applicable governance framework
Governance Model Influence
One source explicitly states: "depending on the context or governance model the issuance itself needs / should / could be signed." This indicates that:
Different operational contexts warrant different authentication levels
There is no universal specification for registration-interaction security requirements
Security Considerations
Scope Narrowing Through Delegation
Multiple sources emphasize narrowing the scope to specific roles through delegatable authority as a critical security feature. Rather than presenting a broad credential that could be captured and misused, the approach involves:
Pre-registration scope limitation: Creating credentials limited to specific roles (e.g., "Document Submitter")
Delegatable authority: Using KERI's delegation mechanisms to restrict what actions can be performed
Minimizing exposure: Presenting only the authority necessary for the specific interaction
This represents a form of contingent disclosure where only minimum necessary authority is revealed.
Replay Attack Prevention
The sources emphasize that replay attack prevention is important for registration interactions, but with significant qualifications:
Requirements vary "depending on the context or governance model"
The specific mechanisms are not detailed in available sources
Implementation depends on whether the process is idempotent
One source references KRAM (KERI Request Authentication Method) in the broader glossary context, which includes ISO-8601 timestamp validation within acceptable time windows, but does not explicitly specify KRAM as a requirement for registration-interactions.
Idempotency Considerations
Multiple sources note that idempotent processes (where resubmission has no effect) may have different signature requirements than non-idempotent operations. This design consideration affects implementation:
For idempotent processes: The risk profile differs since resubmission cannot cause harm
For non-idempotent operations: Stronger replay attack prevention may be necessary
The specific requirements depend on the operational context
Relationship to Access-Controlled Interactions
Several sources reference access-controlled-interaction as a related concept. The access-controlled interaction documentation addresses:
Actions requiring authorization (such as report submission)
Request deduplication: Load balancers need mechanisms to drop repeated requests
DDoS attack concerns: Repeated submissions could be weaponized for denial-of-service
Limited replay attack concerns: Replay attacks are "less of a concern" in this context, except as DDoS vectors
This suggests that registration-interaction and access-controlled-interaction are part of a broader framework for managing different types of interactions in KERI systems, though the sources do not provide detailed specifications for this framework.
Technical Implementation Gaps
The available documentation reveals several areas where technical details are not specified:
Unspecified Process Steps
While sources mention "new AID creation" and "authorization establishment," they do not detail:
The specific sequence of operations
Error handling procedures
Witness configuration requirements for the new AID
Key rotation considerations
Confirmation mechanisms after successful registration
The sources explicitly identify several security questions that remain context-dependent:
Bearer Token Characteristics: When a credential functions as proof-of-authority, is possession sufficient?
Issuee Authentication: Must the presenter prove they are the legitimate issuee through signatures?
Signature Requirements: Do different governance models require different signature levels?
Replay Prevention: What specific mechanisms are appropriate for different operational contexts?
Idempotency Effects: How do idempotent vs. non-idempotent processes affect security requirements?
Conclusion
The available documentation on registration-interaction consists primarily of informal technical commentary with unresolved questions rather than formal specifications. The core concept involves creating a new AID and establishing authorization through credential presentation, with emphasis on scope narrowing to prevent credential misuse.
However, critical implementation details—including signature requirements, credential verification procedures, and replay attack prevention mechanisms—are explicitly characterized as context-dependent and determined by applicable governance frameworks rather than universal protocol specifications.
Consult applicable governance frameworks to determine specific requirements
Consider operational context when designing security mechanisms
Implement scope narrowing through delegatable authority
Account for idempotency in security design
Recognize that universal specifications do not currently exist in documented sources
The informal nature of available documentation suggests this terminology may represent work-in-progress discussions rather than settled protocol specifications, reflecting ongoing design conversations within the KERI community.
Mitigation Strategies: Scope limitation, short validity periods, and replay protection mitigate bearer token risks
Witness Configuration
Proper witness configuration during AID inception is critical:
Select witnesses with appropriate geographic and jurisdictional diversity
Configure TOAD threshold to balance security (higher threshold) and availability (lower threshold)
Ensure witnesses are reachable and responsive during registration
Implement retry logic for witness communication failures
Consider witness rotation capabilities for long-lived AIDs
Error Handling and Rollback
Registration interactions involve multiple steps that may fail. Implement proper error handling:
Atomic Operations: Ensure AID creation and authorization configuration are atomic (both succeed or both fail)
Rollback Mechanisms: If authorization configuration fails after AID creation, rollback the AID creation
Partial Failure Handling: Determine how to handle scenarios like insufficient witness receipts
User Feedback: Provide clear error messages that guide users to resolution without exposing security details
Integration with KERIA/Signify
When integrating with KERIA (cloud agent) and Signify (web client):