Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 9 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
Transfer-off-ledger is the process of migrating control authority over an identifier from a blockchain or distributed ledger to KERI's native verifiable data structure (KEL), enabling portable, ledger-independent identifiers while maintaining cryptographic verifiability and identifier continuity.
Transfer-off-ledger represents a critical migration capability within KERI that enables the transition of control authority over an identifier from blockchain-based or distributed ledger systems to KERI's native Key Event Log (KEL) infrastructure. This process accomplishes the transformation of ledger-dependent identifiers into fully portable, ledger-independent identifiers while preserving cryptographic verifiability, identifier continuity, and the complete history of control authority.
The process is fundamentally about changing the backing infrastructure of an identifier without changing the identifier itself. When an identifier is initially anchored to a ledger (such as Hyperledger Indy or Ethereum), the ledger serves as the verifiable data registry that maintains the authoritative state of the identifier. Through transfer-off-ledger, this authoritative state responsibility migrates to KERI's native infrastructure components—witnesses, backers, and watchers—which provide equivalent or superior verifiability without ledger dependencies.
This capability is particularly valuable for organizations currently using blockchain-based identity systems who seek to:
Implementations MUST enforce the single anchor constraint at the protocol level. When processing a rotation event that changes backing infrastructure, verify that:
br (backer remove) field properly clears ledger anchors before ba (backer add) establishes new infrastructureFailure to enforce this constraint can lead to ambiguous control authority and verification failures.
Before executing transfer-off-ledger, implementations should verify:
Attempting transfer without operational witness infrastructure can leave the identifier in an unverifiable state.
Implementations must collect sufficient witness receipts to meet the TOAD threshold. Recommended approach:
Partial receipt collection (below threshold) leaves the identifier in a vulnerable state where validators may not accept the rotation.
Implementations should maintain backward compatibility during transition periods:
Abrupt cutover without grace period can break existing validator integrations.
Implement robust error recovery for common failure scenarios:
The process is executed through KERI's rotation event mechanism, which provides the cryptographic foundation for changing the set of entities responsible for witnessing and validating the identifier's key state.
The transfer-off-ledger process begins with an identifier that is anchored to a blockchain or distributed ledger. In this initial state:
This initial configuration provides the benefits of blockchain-based verification but creates dependencies on specific ledger implementations and their associated costs and constraints.
Before executing the transfer, the controller must establish alternative verification infrastructure:
The witness infrastructure must be fully operational before initiating the transfer to ensure continuous verifiability throughout the migration process.
The core of the transfer-off-ledger process is a rotation event that changes the identifier's backing infrastructure:
Rotation Event Creation: The controller creates a rotation event that:
Event Signing: The rotation event is signed using the current authoritative keypairs, proving the controller's authority to execute the transfer
Event Broadcasting: The signed rotation event is broadcast to:
Witness Confirmation: The new witness set receives, validates, and signs receipts for the rotation event, establishing their role as the authoritative verification infrastructure
Following the rotation event, the identifier's verification infrastructure transitions:
KEL Update: The rotation event is appended to the identifier's KEL, creating a verifiable record of the infrastructure change
Witness Receipt Collection: The controller collects signed receipts from the witness set, forming a KERL (Key Event Receipt Log) that proves witness agreement
Verification Path Change: Validators now verify the identifier by:
Ledger Independence: The identifier becomes fully independent of the ledger, with all subsequent events verified through the witness infrastructure
After successful transfer, the identifier operates in a fully KERI-native mode:
Portable Identifier: The identifier is now a non-ledger based portable identifier that can be verified without any ledger dependencies
Witness-Based Verification: All key events are witnessed and verified by the KERI witness infrastructure
Continued Evolution: The identifier can undergo further rotations, changing witness sets or other configuration parameters as needed
Optional Re-Anchoring: If desired, the identifier can be anchored to a different ledger through another rotation event (subject to the single-anchor constraint)
Rotation Authority: The controller must possess the current signing keys and the pre-rotated keys necessary to execute a valid rotation event. Without these keys, the transfer cannot be cryptographically authorized.
Signature Verification: All rotation events must include valid digital signatures that can be verified against the current key state. The signatures must meet the threshold requirements specified in the previous establishment event.
Cryptographic Strength: All cryptographic operations must maintain cryptographic strength of at least 128 bits of entropy, with consideration for post-quantum security in long-lived identifiers.
Digest Integrity: The rotation event must include correct digests of the previous event, maintaining the backward-chaining integrity of the KEL. Any digest mismatch invalidates the rotation.
A critical technical limitation explicitly documented in the source materials is the single anchor constraint: an identifier can only be anchored to one ledger at a time. This constraint has several implications:
No Multi-Ledger Anchoring: An identifier cannot be simultaneously anchored to multiple ledgers (e.g., both Hyperledger Indy and Ethereum)
Sequential Migration Only: If moving between ledgers, the identifier must first transfer off the current ledger, then optionally anchor to a new ledger through a subsequent rotation
Clear Control Authority: The single-anchor constraint ensures unambiguous control authority and prevents conflicting state representations across different ledgers
Verification Simplicity: Validators have a single, clear source of truth for the identifier's state, avoiding the complexity of multi-ledger consensus
This constraint is fundamental to KERI's architecture and cannot be circumvented through configuration or implementation choices.
Witness Availability: The new witness infrastructure must be operational and accessible before executing the rotation event. If witnesses are unavailable, the transfer may fail or leave the identifier in an unverifiable state.
Event Propagation: Time must be allowed for the rotation event to propagate to all witnesses and for witness receipts to be collected. The controller should not consider the transfer complete until sufficient witness confirmations are received.
Validator Synchronization: Existing validators may continue querying the ledger until they discover the rotation event. The controller should maintain ledger accessibility during a transition period to ensure validator continuity.
Grace Period: Organizations should plan for a grace period where both ledger and witness infrastructure remain operational, allowing validators to discover and adapt to the new verification path.
Insufficient Witness Receipts: If the controller cannot collect sufficient witness receipts to meet the TOAD threshold, the rotation may not achieve the desired level of verifiability. The controller must either:
Rotation Event Rejection: If witnesses reject the rotation event (due to invalid signatures, incorrect digests, or other validation failures), the transfer fails and the identifier remains ledger-anchored. The controller must diagnose and correct the issue before retrying.
Ledger Finality: Some ledgers have finality delays where transactions are not immediately immutable. Controllers should ensure the final ledger-anchored event achieves finality before considering the ledger relationship terminated.
Duplicity Detection: If duplicity is detected during the transfer (e.g., conflicting rotation events), the transfer should be halted and the duplicity resolved before proceeding. KERI's duplicity detection mechanisms provide ambient verifiability of such conflicts.
The most commonly documented use case involves migrating identifiers from Hyperledger Indy to KERI-native infrastructure:
Initial State: Organization has DIDs anchored to an Indy ledger, with all verification dependent on Indy node availability and consensus.
Migration Strategy:
Benefits:
Organizations may adopt a hybrid approach where some identifiers remain ledger-anchored while others transfer off-ledger:
High-Value Identifiers: Critical identifiers (e.g., root AIDs for organizational hierarchies) may remain ledger-anchored for additional assurance and regulatory compliance.
Operational Identifiers: Day-to-day operational identifiers transfer off-ledger to reduce costs and improve performance.
Gradual Migration: New identifiers are created as KERI-native (never ledger-anchored), while legacy identifiers migrate off-ledger as operational requirements permit.
Risk Mitigation: The hybrid approach allows organizations to validate KERI witness infrastructure reliability before committing all identifiers to off-ledger operation.
While not KERI's primary design goal, the transfer-off-ledger capability enables cross-ledger migration:
Process:
Constraints:
Use Cases:
Pre-Transfer Validation: Before executing transfer-off-ledger:
Witness Selection: Choose witnesses that provide:
Communication Strategy: Inform stakeholders about the transfer:
Rollback Planning: Maintain the ability to reverse the transfer if issues arise:
Validator Updates: Applications and services that validate the identifier must be updated to:
Credential Issuance: If the identifier is used for issuing ACDCs or other verifiable credentials, the transfer-off-ledger process affects:
Monitoring and Observability: Implement monitoring for:
The source documents explicitly state that while KERI can move identifiers across networks through transfer-off-ledger, this capability was not KERI's primary design goal. KERI's architecture prioritizes:
The transfer-off-ledger capability exists to provide a migration path for existing ledger-based identity systems, not as the primary operational mode. Organizations adopting KERI are encouraged to create new identifiers as KERI-native from inception rather than relying on ledger anchoring and subsequent transfer.
This design philosophy reflects KERI's goal of creating a truly decentralized key management infrastructure (DKMI) where identifier portability and controller autonomy are fundamental properties, not features achieved through complex migration processes.
Insufficient Receipts: If witness receipt collection fails to meet threshold, implementations should:
Duplicity Detection: If conflicting rotation events are detected during transfer:
Network Partitions: If network connectivity issues prevent witness communication:
For large-scale deployments transferring many identifiers:
Key Protection: During transfer-off-ledger, implementations must protect:
Compromise of key material during transfer can enable unauthorized rotations or identifier hijacking.
Witness Verification: Implementations must cryptographically verify:
Accepting invalid receipts can create false confidence in transfer completion.
Production implementations should instrument:
This telemetry enables operational teams to identify and resolve issues quickly.
Comprehensive testing should cover:
Testing should use both simulated and real witness infrastructure to validate production readiness.