Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 177 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
A root autonomic identifier (RID) is a specialized AID that serves as the foundational root-of-trust for an entire ecosystem through delegation mechanisms, requiring the highest level of security in its key management and enabling hierarchical trust structures through multi-valent key management infrastructure.
A root autonomic identifier (RID) is defined as an entity's root AID that provides the root-of-trust for an entire ecosystem utilizing delegation. The RID must be protected using the highest level of security in its key management infrastructure.
The canonical abbreviation is RID, representing "root AID." This term is formally defined in Samuel Smith's Universal Identifier Theory whitepaper, which provides the theoretical foundation for KERI's hierarchical identifier architecture.
Within the vLEI ecosystem, the RID concept is most prominently embodied by the GLEIF Root AID, which serves as the ultimate cryptographic anchor for the entire vLEI credential infrastructure. The GLEIF Root AID:
Highest Security Level: RID implementations must use the most secure key management practices available, including HSMs, TEEs, and multi-party control mechanisms.
Entropy Requirements: Minimum 128 bits of cryptographic strength for all key generation operations.
Operational Procedures: Establish formal ceremonies for critical operations like key rotation and delegation authorization.
Cooperative Model: Remember that KERI delegation is cooperative—both delegator and delegate must participate. The RID cannot unilaterally assert delegation.
Seal Timing: The RID's delegation seal must be created and published before the delegate can issue valid events under the delegation.
Verification Path: Ensure that verifiers can access both the RID's KEL and the delegate's KEL to verify the delegation relationship.
Policy Alignment: RID management procedures must align with ecosystem governance frameworks, particularly regarding access control and operational procedures.
Audit Requirements: Maintain comprehensive audit trails of all RID operations for governance compliance and security monitoring.
Succession Planning: Establish clear procedures for RID controller succession to ensure ecosystem continuity.
GLEIF's implementation of the RID concept demonstrates the practical application of root autonomic identifiers in a production governance framework:
GLEIF Root AID: The apex identifier that delegates authority to:
This hierarchical structure enables GLEIF to maintain extreme protection for the root identifier while supporting more performant key management for operational activities through delegation.
The RID concept relates to several key governance entities:
A RID serves several critical functions within a KERI-based ecosystem:
Trust Anchor: The RID provides the ultimate cryptographic root-of-trust for all identifiers and credentials within its ecosystem. Any entity verifying credentials can trace the chain of trust back to this root identifier.
Delegation Authority: The RID controller has the authority to create delegated identifiers that inherit trust from the root. This enables:
Security Foundation: The RID establishes the security baseline for the entire ecosystem. Compromise of the RID would undermine trust in all dependent identifiers, making its protection paramount.
The RID controller possesses several critical authorities:
Establishment Authority: The ability to create the initial root identifier through an inception event, establishing the cryptographic foundation for the ecosystem.
Delegation Authority: The power to create delegated identifiers by:
Rotation Authority: The exclusive right to rotate the RID's keys through pre-rotation mechanisms, maintaining control authority despite key compromise.
Revocation Authority: The ability to revoke delegated identifiers by rotating to a state that no longer recognizes the delegation, effectively terminating the delegate's authority.
Despite its foundational role, the RID has important limitations:
No Retroactive Authority: The RID cannot retroactively authorize events that occurred before delegation was established. The delegation relationship must be cryptographically committed before the delegate can issue valid events.
Cooperative Delegation Requirement: KERI's delegation model is cooperative, meaning both the delegator (RID) and delegate must contribute cryptographic commitments. The RID cannot unilaterally assert delegation without the delegate's participation.
Key Management Burden: The requirement for highest level security in key management creates operational constraints:
The RID concept is closely tied to multi-valent key management infrastructure, which enables the critical balance between security and performance:
Bivalent Architecture: A nested set of layered delegations wraps each layer with compromise recovery protection from the next higher layer. This maintains the security of the root layer for compromise recovery all the way to the leaves, even when leaves use less secure key management methods.
Security Gradient: The architecture allows:
For a RID to fulfill its role, it must meet stringent cryptographic requirements:
Entropy: The RID must be generated from a random number seed with at least 128 bits of cryptographic strength, providing adequate security against brute-force attacks.
Key Pairs: The RID requires two sets of asymmetric signing key pairs:
Derivation: The RID prefix is derived from cryptographic digests of:
The RID enables delegation through a specific cryptographic protocol:
Delegated Inception: When creating a delegated identifier, the delegate creates a delegated inception event (dip) that includes:
di fieldDelegator Commitment: The RID controller must create an interaction event or rotation event containing a seal that commits to:
i)s)d)Verification: Any verifier can confirm the delegation by:
The RID faces unique security threats due to its foundational role:
High-Value Target: Compromise of the RID undermines trust in the entire ecosystem, making it an attractive target for sophisticated attackers.
Long-Term Exposure: RIDs are typically long-lived identifiers, increasing cumulative exposure to attacks over time.
Cascading Impact: Compromise of the RID affects not just the root identifier but all delegated identifiers and credentials issued under its authority.
To address these threats, RID implementations should employ multiple protection layers:
Key Generation: Use cryptographically-secure pseudo-random number generators (CSPRNG) or true random number generators with at least 128 bits of entropy.
Key Storage: Implement highest level protection through:
Operational Security:
The RID leverages KERI's pre-rotation mechanism to provide compromise recovery:
Forward Commitment: Each establishment event commits to the next set of rotation keys through cryptographic digests, hiding the actual keys until needed.
One-Time Use: Rotation keys are used exactly once, minimizing exposure windows.
Post-Quantum Security: The cryptographic hiding of pre-rotated keys provides protection against future quantum attacks, as the keys remain unexposed until rotation.
Recovery Process: If current signing keys are compromised, the RID controller can use the pre-rotated keys to perform a rotation, re-establishing control authority without requiring cooperation from the attacker.
Establishing a RID-based ecosystem follows a specific pattern:
Creating delegated identifiers from a RID involves coordination:
Performance Trade-offs: The highest security requirements for RIDs create performance constraints. Organizations must balance:
Governance: RID management requires clear governance:
The vLEI Ecosystem Governance Framework provides the authoritative governance context for RID implementation in the GLEIF ecosystem:
Primary Document: vLEI Ecosystem Governance Framework v3.0 establishes GLEIF's role as both Governing and Administering Authority, with the GLEIF Root AID serving as the RID for the ecosystem.
GLEIF Identifier Governance Framework: Specifically addresses the creation, management, and lifecycle of the GLEIF Root AID and its delegated AIDs (GIDA and GEDA), establishing the highest duty of care requirements.
Technical Requirements Part 1: KERI Infrastructure: Defines the technical specifications for AID generation, key management, and delegation mechanisms that apply to the GLEIF Root AID.
KERI Specification: The foundational protocol specification maintained by the Trust over IP Foundation defines the technical mechanisms for autonomic identifiers, delegation, and key management.
Universal Identifier Theory: Samuel Smith's whitepaper provides the theoretical foundation for the RID concept, explaining how autonomic identifiers enable hierarchical trust structures.
Trust Assurance Framework: Establishes the security requirements and compliance obligations for all participants in the vLEI ecosystem, including specific requirements for root identifier protection.
Qualified vLEI Issuer Qualification Program Manual: Defines how QVIs receive delegated authority from the GLEIF Root AID through GEDA, establishing the operational procedures for delegation.
The root autonomic identifier represents a critical architectural concept in KERI-based ecosystems, enabling the creation of hierarchical trust structures that balance security and operational efficiency. By serving as the ultimate cryptographic anchor for an ecosystem, the RID enables scalable, secure identity infrastructure while maintaining the self-sovereign properties that distinguish KERI from traditional PKI systems. The GLEIF vLEI ecosystem demonstrates the practical application of RID concepts in a production governance framework, providing a model for other ecosystems seeking to implement hierarchical trust structures based on KERI principles.