Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 74 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
A trust domain is the ecosystem of interactions that rely on a specific trust basis—the cryptographic and logical bindings between controllers, identifiers, and key-pairs. It defines the scope within which cryptographically verifiable, non-repudiable statements can be made and verified.
A trust domain represents the complete ecosystem of interactions, relationships, and transactions that depend on a shared trust basis for establishing authenticity and control authority. The trust basis creates persistent, verifiable bindings between three fundamental components:
The trust domain concept addresses a fundamental challenge in digital systems: how to establish boundaries within which statements, credentials, and transactions can be verified as authentic without requiring universal agreement or centralized authorities. Every trust domain operates according to its own rules, governance frameworks, and verification mechanisms, but the cryptographic properties of the trust basis enable interoperability across domain boundaries.
Key properties of trust domains include:
The concept of trust domains emerged from the recognition that digital systems require explicit boundaries for trust relationships. Traditional approaches to trust domains include:
When establishing a trust domain, consider:
When designing systems that span trust domains:
Clearly define trust domain boundaries:
Historically, trust domains were established through administrative authorities such as:
These administrative trust domains suffer from several limitations:
Blockchain and distributed ledger technologies introduced algorithmic trust domains where:
While algorithmic trust domains provide stronger security than administrative approaches, they create new limitations:
KERI introduces autonomic trust domains that fundamentally differ from both administrative and algorithmic approaches. The key innovation is establishing trust domains through cryptographic self-certification rather than external authorities or shared infrastructure.
KERI trust domains are built on Autonomic Identifiers (AIDs) that provide:
The autonomic trust basis creates what KERI terms a cryptographic root-of-trust—a foundation for trust that requires no external validation or shared consensus. This is achieved through:
When an AID is created through an inception event, it simultaneously establishes a new trust domain. This trust domain:
A critical advantage of KERI's approach is enabling trust spanning—the ability to establish verifiable trust relationships across different trust domains without requiring those domains to share infrastructure or governance. This is achieved through:
The Trust Spanning Protocol (TSP) concept extends this further, envisioning a universal layer where every internet message carries cryptographic proof of its origin, effectively creating a global trust domain built from interoperable local trust domains.
KERI recognizes that trust domains provide context for interpretation. The same identifier or credential may have different meanings or authority levels in different trust domains. For example:
Enterprise Identity Management: Organizations can establish their own trust domains using KERI AIDs as root identifiers, then delegate authority to departments, systems, and individuals. Unlike traditional enterprise directories, these trust domains remain verifiable even when employees interact with external parties.
Supply Chain Verification: Each participant in a supply chain can operate within their own trust domain while creating verifiable links to other participants' domains through ACDC credential chains. This enables end-to-end provenance tracking without requiring all parties to use the same infrastructure.
Cross-Border Credentials: The GLEIF vLEI ecosystem demonstrates trust domains spanning jurisdictions. GLEIF establishes a root trust domain, delegates to Qualified vLEI Issuers (QVIs) who create their own trust domains, and legal entities receive credentials that are verifiable globally despite originating from jurisdiction-specific issuers.
Decentralized Applications: Applications can establish trust domains for their users without requiring centralized identity providers. Users control their own AIDs and can interact across multiple application trust domains while maintaining consistent identity.
Eliminates Platform Lock-in: Trust domains based on cryptographic self-certification are portable across platforms. An identifier established in one trust domain can be verified in any other domain without requiring permission or coordination.
Enables Zero-Trust Architecture: Because trust domains provide end-verifiable proofs, systems can implement true zero-trust security models where "never trust, always verify" is cryptographically enforceable.
Supports Graduated Trust: Different trust domains can implement different security policies and verification requirements. High-stakes interactions can require stronger evidence while routine interactions can use lighter-weight verification.
Facilitates Interoperability: Trust domains can interoperate through cryptographic verification without requiring shared governance, infrastructure, or business relationships. This enables ecosystem growth without coordination overhead.
Complexity vs. Flexibility: Establishing and managing trust domains requires understanding cryptographic concepts and key management practices. This complexity is the price of flexibility and security.
Discovery Challenges: While trust within a domain is cryptographically verifiable, discovering which trust domains are relevant for a given interaction remains a social/technical challenge. OOBI provides mechanisms but doesn't eliminate the discovery problem entirely.
Governance Boundaries: Trust domains must establish clear governance policies for key management, delegation, and revocation. Different domains may have incompatible policies, requiring careful design of cross-domain interactions.
Context Dependency: The meaning and authority of identifiers and credentials can vary across trust domains. Systems must carefully manage context to avoid misinterpretation of cross-domain references.
KERI trust domains coexist with and can bridge to other trust models:
This flexibility enables gradual adoption and integration with existing systems while providing a path toward fully autonomous, cryptographically-grounded trust domains.