Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 10 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
A setup process in KERI that establishes a new [AID](/concept/aid) (Autonomic Identifier) and configures mechanisms for access control, typically involving the presentation of a with scope-limited delegatable to prevent credential capture and misuse.
Registration-interaction appears in KERI documentation as informal technical commentary rather than a formally specified process. The term emerged from technical discussions among KERI Suite core contributors (Samuel Smith, Daniel Hardman, and Lance Byrd) during a KERI Suite Zoom meeting on January 16, 2024 (discussion minutes 30-60). The available documentation explicitly characterizes these as exploratory notes with unresolved questions rather than settled specifications.
The sources describe registration-interaction as a setup/registration interaction where:
The core concern articulated across sources is preventing credential capture and misuse during this presentation. The documentation suggests that narrowing scope to specific roles (exemplified as "Document Submitter") represents a form of pre-registration using delegatable authority.
The sources repeatedly emphasize that key implementation details depend on context rather than being universally specified. The most prominent unresolved question is:
Does the credential need to be delivered by the issuee?
The sources frame credentials as functioning "like a bearer token" where possession provides proof of authorization. However, multiple documents explicitly state: "Does the delivery require the issuee signature? Depends on the context."
This context-dependency means:
One source explicitly states: "depending on the context or governance model the issuance itself needs / should / could be signed." This indicates that:
Multiple sources emphasize narrowing the scope to specific roles through delegatable authority as a critical security feature. Rather than presenting a broad credential that could be captured and misused, the approach involves:
This represents a form of contingent disclosure where only minimum necessary authority is revealed.
The sources emphasize that replay attack prevention is important for registration interactions, but with significant qualifications:
One source references KRAM (KERI Request Authentication Method) in the broader glossary context, which includes ISO-8601 timestamp validation within acceptable time windows, but does not explicitly specify KRAM as a requirement for registration-interactions.
Multiple sources note that idempotent processes (where resubmission has no effect) may have different signature requirements than non-idempotent operations. This design consideration affects implementation:
Several sources reference access-controlled-interaction as a related concept. The access-controlled interaction documentation addresses:
This suggests that registration-interaction and access-controlled-interaction are part of a broader framework for managing different types of interactions in KERI systems, though the sources do not provide detailed specifications for this framework.
The available documentation reveals several areas where technical details are not specified:
While sources mention "new AID creation" and "authorization establishment," they do not detail:
Sources do not specify:
Sources do not detail:
The sources explicitly identify several security questions that remain context-dependent:
The available documentation on registration-interaction consists primarily of informal technical commentary with unresolved questions rather than formal specifications. The core concept involves creating a new AID and establishing authorization through credential presentation, with emphasis on scope narrowing to prevent credential misuse.
However, critical implementation details—including signature requirements, credential verification procedures, and replay attack prevention mechanisms—are explicitly characterized as context-dependent and determined by applicable governance frameworks rather than universal protocol specifications.
Developers implementing registration interactions must:
The informal nature of available documentation suggests this terminology may represent work-in-progress discussions rather than settled protocol specifications, reflecting ongoing design conversations within the KERI community.
The source documents repeatedly emphasize that security requirements for registration interactions are context-dependent rather than absolute. Implementers must:
The source documents specifically call out the need for load balancers to implement mechanisms to drop repeated requests. This is critical for preventing DDoS attacks through resubmission of valid registration requests. Implementation must:
The source documents emphasize narrowing credential scope to specific roles as a primary defense against credential capture and misuse. This is described as "pre-registration via delegatable authority." Implementers should:
The source documents frame credentials as functioning "like a bearer token," which has significant security implications:
Proper witness configuration during AID inception is critical:
Registration interactions involve multiple steps that may fail. Implement proper error handling:
When integrating with KERIA (cloud agent) and Signify (web client):
Implement comprehensive audit logging for compliance: