Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 7 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
A centrally managed schema registry where corporations or individuals reserve schemas within specific namespaces to enable interoperable schemas labeled with organization-specific or individual-specific identifiers. In ACDC architecture, this traditional centralized model has been superseded by directed acyclic graphs that provide decentralized interoperability by design.
A schema-namespace-registry represents a traditional approach to managing credential schemas through centralized coordination. In this model, a central authority maintains a registry where organizations or individuals can reserve specific namespaces for their schemas. This reservation system ensures that schemas carrying organization-specific or individual-specific namespace labels remain interoperable across different systems and implementations.
The core properties of a traditional schema namespace registry include:
The scope of a schema namespace registry extends to defining the structure, semantics, and validation rules for verifiable credentials and other data structures within its managed namespaces. The boundaries are defined by the registry's governance framework and the namespace allocation policies it enforces.
Schema namespace registries emerged from the need to coordinate credential formats across multiple issuers and verifiers in digital identity ecosystems. Traditional verifiable credential systems, particularly those following W3C specifications, required some mechanism to ensure that credential schemas from different organizations could be uniquely identified and properly interpreted.
When working with ACDC schemas instead of traditional namespace registries:
Schema Definition: Define schemas as SAIDs rather than namespace-prefixed identifiers. The content-addressable nature of SAIDs eliminates namespace collision concerns.
Schema Discovery: Implement OOBI-based discovery mechanisms rather than registry queries. Consider maintaining community directories as convenience layers over the decentralized infrastructure.
Schema Governance: Express governance policies as verifiable credentials that can be cryptographically verified rather than enforced through registry access controls.
Schema Evolution: Use the DAG structure to maintain verifiable lineage when evolving schemas, with edges connecting derived schemas to their sources.
Verification Logic: Implement schema verification through cryptographic validation of SAIDs and KEL anchoring rather than registry lookups.
The shift from centralized registries to graph-based schema management represents a fundamental architectural change that requires rethinking traditional credential system design patterns.
In legacy identity systems, this coordination challenge was typically solved through:
This centralized approach created several dependencies:
The ACDC (Authentic Chained Data Container) protocol fundamentally transforms the schema namespace registry concept through its use of directed acyclic graphs (DAGs). This architectural innovation decentralizes the traditional centralized registry model while maintaining—and enhancing—interoperability.
ACDC's graph-based approach eliminates the need for centralized namespace coordination by embedding schema relationships directly into the credential structure itself. Each ACDC contains:
The directed acyclic graph structure ensures that schema relationships are:
ACDC achieves what traditional schema namespace registries attempted through centralization, but does so through cryptographic data structures:
Content-addressable schemas: The SAID of a schema definition serves as its globally unique identifier, eliminating namespace collision concerns
Verifiable schema chains: The DAG structure creates authentic provenance chains for schema evolution and derivation
Distributed discovery: OOBI (Out-Of-Band Introduction) enables decentralized schema discovery without registry queries
Cryptographic binding: Schemas are bound to AIDs (Autonomic Identifiers) through KEL (Key Event Log) anchoring, providing verifiable authorship
This approach transforms schema interoperability from an organizational coordination problem into a cryptographic verification problem. Instead of trusting a central registry to maintain namespace uniqueness and schema definitions, verifiers can cryptographically verify schema integrity and provenance directly from the ACDC structure.
While ACDC eliminates the need for centralized technical infrastructure, it does not eliminate governance. Organizations can still establish governance frameworks for schema usage, but these frameworks operate through:
The vLEI (verifiable Legal Entity Identifier) ecosystem demonstrates this approach, where GLEIF establishes governance frameworks for credential schemas without operating a centralized schema registry. Instead, schema definitions are distributed through the ACDC graph structure and verified through cryptographic means.
The transition from centralized schema namespace registries to ACDC's graph-based approach impacts several key use cases:
Enterprise credential ecosystems: Organizations issuing credentials no longer need to coordinate with a central registry. They can define schemas, publish them through OOBI, and rely on cryptographic verification for interoperability.
Cross-organizational credentials: When credentials need to reference schemas from multiple organizations, the DAG structure enables verifiable composition without requiring all parties to register with a common authority.
Schema evolution: Organizations can evolve their schemas over time, with the DAG structure maintaining verifiable lineage from original to derived schemas without central version management.
Regulatory compliance: In regulated industries like finance (vLEI) or healthcare, schema governance can be enforced through verifiable policy credentials rather than registry access controls.
ACDC's approach to schema management provides several advantages over traditional namespace registries:
Elimination of single points of failure: No central registry means no registry outages or availability concerns
Reduced coordination overhead: Schema publishers don't need approval or registration with central authorities
Enhanced privacy: Schema resolution doesn't require queries to central services that could track usage patterns
Cryptographic verifiability: Schema integrity and provenance are mathematically verifiable rather than trust-based
Scalability: The decentralized architecture scales horizontally without central bottlenecks
Censorship resistance: No central authority can prevent schema publication or revoke namespace allocations
While ACDC's approach provides significant benefits, it also introduces considerations:
Discovery complexity: Without a central registry, discovering relevant schemas requires alternative mechanisms like OOBI or community-maintained directories
Governance challenges: Establishing and enforcing schema governance without central authority requires new organizational patterns and tooling
Learning curve: Developers familiar with traditional registry-based systems must understand graph-based schema relationships and cryptographic verification
Tooling maturity: The ecosystem of tools for managing decentralized schema graphs is still evolving compared to established registry-based systems
Despite these considerations, ACDC's graph-based approach represents a fundamental architectural improvement that aligns schema management with KERI's broader principles of decentralization, cryptographic verifiability, and autonomic operation. The elimination of centralized schema namespace registries removes a significant trust dependency while maintaining—and enhancing—the interoperability that such registries were designed to provide.