Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 66 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
A trusted data source that provides a complete, authoritative picture of a data object. In KERI/ACDC, the source-of-truth is the cryptographically verifiable record of control authority operations (KEL) and transaction state (TEL), which establishes secure attribution of statements but does not determine the veracity (truthfulness) of their content.
In information systems, a source-of-truth represents the authoritative, canonical location for specific data that is considered the definitive reference. This concept is fundamental to data integrity and information management, establishing which data source should be trusted when conflicts or inconsistencies arise.
The core properties of a source-of-truth include:
The scope of source-of-truth varies by context—it may refer to a database, a distributed ledger, a cryptographic log, or an organizational record system. The boundaries are defined by what data is covered and who has authority to modify it.
KERI makes a critical distinction between two aspects of truth that are often conflated:
KERI and ACDC protocols provide secure attribution—cryptographic proof of who made a statement or issued data—but explicitly do not determine veracity—whether what was said is actually true. This separation of concerns is foundational to KERI's architecture:
What KERI Provides:
When implementing KERI-based systems, clearly separate:
Cryptographic Layer: KERI provides source-of-truth for:
Governance Layer: External systems must provide:
Implementations must treat the KEL as the authoritative record:
Respect the principle that controllers are the source-of-truth for their identifiers:
Implement clear interfaces between KERI's cryptographic source-of-truth and governance-based trust assessment:
Never assume cryptographic verification equals content truth:
What KERI Does NOT Provide:
In KERI, the Key Event Log (KEL) serves as the source-of-truth for an identifier's control authority. The KEL is an append-only, cryptographically chained data structure that records:
The ordering of these events and their cryptographic dependencies form the authoritative record of control authority operations. This record is:
Transaction Event Logs (TELs) extend the source-of-truth concept to credential lifecycle management. A TEL provides the authoritative record of:
TELs are anchored to KELs through cryptographic seals, creating a verifiable chain from credential state back to the controlling identifier's root-of-trust.
KERI implements a "RUN off the CRUD" model (RUN = Read, Update, Nullify vs. CRUD = Create, Read, Update, Delete). In this architecture:
This inverts the traditional client-server model where servers act as the source-of-truth. In KERI, controllers maintain sovereignty over their identity data.
The KERI specifications ground their discussion in the philosophical definition of truth as "the property of being in accord with fact or reality." This acknowledges that truth aims to represent reality but must be ascertained through verification processes beyond cryptographic primitives.
KERI's design philosophy recognizes that:
Understanding KERI's source-of-truth model has critical architectural implications:
Separation of Concerns: The cryptographic identity layer (KERI) is separated from semantic truth evaluation. Systems must be designed with this boundary in mind—KERI provides the foundation for attributable statements, but additional layers handle truth determination.
Governance Requirements: Organizations need governance frameworks to establish truth criteria beyond cryptographic verification. This includes:
Infrastructure Independence: KERI's source-of-truth (the KEL) is portable and not locked to specific infrastructure. This enables:
Issuers must understand that KERI provides:
Attribution Infrastructure: The ability to cryptographically prove that a specific AID issued a credential, with non-repudiable signatures and verifiable key state.
Not Reputation Infrastructure: KERI does not automatically establish that an issuer is trustworthy or that their claims are accurate. Reputation must be built through:
Verifiers must recognize the distinction:
Cryptographic Verification: KERI enables verification that:
Trust Determination: Verifiers must separately assess:
This separation prevents the misconception that cryptographic verification equals trust in content.
Supply Chain Provenance: KERI provides source-of-truth for who made statements about product origin, handling, and custody. Determining whether those statements are true requires additional verification (physical inspection, sensor data, third-party audits).
Educational Credentials: KERI establishes source-of-truth for which institution issued a degree credential. Verifying the institution's accreditation and the accuracy of the degree information requires consulting external governance frameworks.
Legal Entity Identity: The vLEI ecosystem uses KERI as source-of-truth for cryptographic control over Legal Entity Identifiers. GLEIF governance provides the trust framework for determining which entities are authorized to issue vLEI credentials.
Governance Dependency: While KERI eliminates cryptographic trust dependencies, it does not eliminate the need for governance. Truth determination requires human/organizational processes that KERI supports but does not replace.
Complexity: The separation between attribution and veracity adds conceptual complexity. Implementers must understand where KERI's guarantees end and where additional verification begins.
Veracity Gap: KERI deliberately does not solve the veracity problem. This is a feature (enabling flexible trust models) but requires additional infrastructure for complete identity systems.
Traditional PKI systems often conflate source-of-truth with trust in content. A certificate from a trusted CA is treated as both:
KERI separates these concerns, providing cryptographic source-of-truth for attribution while leaving reputation and trust assessment to governance layers. This enables more flexible and portable identity systems that don't depend on centralized trust authorities.