Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 36 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
A vLEI role credential is a verifiable credential issued within the GLEIF vLEI ecosystem that cryptographically attests to an individual's or entity's authorized role within a legal entity, enabling them to act in that capacity on behalf of the organization with cryptographic proof of .
A vLEI role credential is a vLEI credential that cryptographically attests to a role within a legal entity held by an individual or entity. According to the GLEIF vLEI Ecosystem Governance Framework, it provides verifiable proof that the credential holder is authorized to act in that specific role on behalf of the legal entity.
The vLEI ecosystem defines two primary types of role credentials:
Both credential types are implemented as ACDCs (Authentic Chained Data Containers) and leverage KERI protocol infrastructure for cryptographic verifiability and key management.
Source Governance Framework: The authoritative governance is established through multiple framework documents:
Official Abbreviations:
vLEI role credentials occupy a critical position in the hierarchical trust chain of the vLEI ecosystem:
Trust Chain: GLEIF Root → GEDA (GLEIF External Delegated AID) → QVI → Legal Entity vLEI Credential → vLEI Role Credentials (OOR/ECR)
This hierarchical structure enables:
GLEIF serves as the root of trust for the entire vLEI ecosystem, operating under a three-tier governance model:
vLEI role credentials operate within this governance structure by:
Legal Entity Authorized Representatives (LARs): Individuals authorized by a legal entity to request issuance and manage vLEI role credentials. LARs play a critical role in the authorization workflow, particularly for QVI-mediated issuance.
QVI Authorized Representatives (QARs): Individuals authorized by QVIs to perform credential issuance operations. QARs cannot issue role credentials without explicit authorization from LARs through QVI AUTH vLEI Credentials.
OOR Persons and ECR Persons: The individuals who receive and hold role credentials, representing the legal entity in their designated capacities.
vLEI role credentials enable credential holders to:
Represent Legal Entities: Act on behalf of the legal entity in the capacity specified by the role credential. For OOR credentials, this includes official organizational functions such as signing contracts, making financial commitments, or representing the entity in regulatory contexts. For ECR credentials, this includes functional or project-specific activities.
Present Verifiable Proof: Provide cryptographically verifiable proof of their authorization to any verifier that accepts vLEI credentials. This proof is context-independent, functioning equally in in-person, online, and telephonic interactions.
Maintain Credential Validity: Ensure their credential remains valid by:
The authority granted by vLEI role credentials is precisely scoped:
OOR vLEI Credentials grant authority to:
officialRole fieldECR vLEI Credentials grant authority to:
engagementContextRole fieldCryptographic Authority: Both credential types provide:
vLEI role credentials have explicit limitations:
Scope Boundaries: Credentials only authorize actions within the defined role scope. An ECR credential for "Project Manager - Infrastructure" does not authorize financial commitments unless explicitly included in the role definition.
Temporal Constraints: Credentials may include validity periods and are subject to:
Jurisdictional Limitations: While vLEI credentials are globally verifiable, their legal enforceability varies by jurisdiction. The vLEI Risk Assessment identifies legal enforceability across jurisdictions as a medium-high impact risk.
Non-Transferability: Role credentials are cryptographically bound to specific AIDs and cannot be transferred to other individuals. The binding to holder principle ensures that proof requests can only be satisfied by the legitimate credential holder.
The issuance process for vLEI role credentials follows a rigorous workflow designed to ensure identity assurance and proper authorization:
Identity Assurance: Before issuance, the identity of the OOR Person or ECR Person must be verified to at least Identity Assurance Level 2 (IAL2) as defined in NIST 800-63A. This involves:
Alternatively, identity assurance can be satisfied through presentation of valid digital identity credentials from approved schemes:
Identity Authentication: The authentication process requires a real-time OOBI (Out-Of-Band Introduction) session with:
This process effectively incorporates IAL3 requirements for supervised remote in-person sessions, even when using IAL2 as the baseline.
For QVI-mediated issuance, the workflow involves:
LAR Authorization: A Legal Entity Authorized Representative creates a QVI AUTH vLEI Credential that explicitly authorizes the QVI to issue a specific role credential to a specific individual (identified by their AID).
Multi-Signature Requirements:
QAR Issuance: Upon receiving the properly authorized QVI AUTH credential, the QVI Authorized Representative issues the role credential to the OOR Person or ECR Person.
Credential Anchoring: The issuance event is anchored to the issuer's KEL (Key Event Log) through an interaction event, creating a verifiable record of issuance.
For direct legal entity issuance (ECR credentials only), the workflow is simplified:
Role credentials are implemented as ACDCs with specific structural requirements:
Attributes Block: Contains:
i: Person issuee AIDdt: Issuance date-time (ISO 8601 format)LEI: Legal Entity Identifier (ISO 17442 format)personLegalName: Recipient's legal name from identity verificationofficialRole (OOR) or engagementContextRole (ECR): Role descriptionEdges Block: Establishes cryptographic chains:
auth edge: Links to the QVI AUTH vLEI Credential (for QVI-mediated issuance) or Legal Entity vLEI Credential (for direct issuance)le edge: Links to the Legal Entity vLEI CredentialThis chaining creates a verifiable directed acyclic graph (DAG) of credentials, enabling verifiers to trace authorization chains back to the GLEIF root of trust.
Verification of vLEI role credentials involves multiple cryptographic and governance checks:
SAID Verification: Verify that the credential's SAID (Self-Addressing Identifier) matches the cryptographic digest of the credential content, ensuring tamper-evidence.
Signature Verification: Verify the issuer's signature on the credential using the issuer's public key from their KEL.
AID Control Verification: Verify that the credential holder controls the AID specified in the credential through a challenge-response protocol.
Chain Verification: Verify the cryptographic chains in the edges block:
auth edge links to a valid QVI AUTH credential or Legal Entity credentialle edge links to a valid Legal Entity vLEI CredentialIssuer Qualification: Verify that the issuer is either:
LEI Status Verification: Verify that the legal entity's LEI has:
Revocation Status: Check the credential's status in the TEL (Transaction Event Log) registry specified in the ri field to ensure the credential has not been revoked.
Temporal Validity: Verify that the current date-time falls within the credential's validity period (if specified).
The context independence principle ensures that verification procedures work identically across:
This universal verifiability is enabled by KERI's end-verifiable architecture, which allows any party to verify credentials without requiring trusted intermediaries.
vLEI role credentials may be revoked under several conditions:
Role Termination: When the individual's role within the legal entity ends (employment termination, role change, contract completion)
Parent Credential Revocation: When the legal entity's vLEI credential is revoked, all dependent role credentials must be revoked
LEI Status Change: When the legal entity's LEI:
Authorization Withdrawal: When the legal entity withdraws authorization for the individual to act in the specified role
Compromise: When the credential holder's private keys are compromised or suspected of compromise
Revocation is implemented through the TEL infrastructure:
Revocation Event Creation: The issuer (QVI or legal entity) creates a revocation event in the credential's TEL
KEL Anchoring: The revocation event is anchored to the issuer's KEL through an interaction event, creating a verifiable record
Witness Confirmation: The revocation event is confirmed by the issuer's witnesses, ensuring distributed consensus
Registry Update: The credential's status in the TEL registry is updated to "revoked"
Grace Period: For certain revocation scenarios (e.g., QVI termination), a 90-day grace period may be implemented to allow credential holders to transition to new issuers
Verifiers must check revocation status by:
ri fieldThe TEL infrastructure provides real-time revocation checking without requiring centralized revocation lists, maintaining the decentralized architecture of the vLEI ecosystem.
vLEI Ecosystem Governance Framework v3.0: The overarching governance document that establishes GLEIF as the governing and administering authority, defines core policies, and establishes the trust framework for the entire vLEI ecosystem.
Legal Entity Official Organizational Role vLEI Credential Governance Framework: Defines requirements for OOR vLEI Credentials issued to official representatives of legal entities, including:
Legal Entity Engagement Context Role vLEI Credential Governance Framework: Defines requirements for ECR vLEI Credentials issued to representatives in functional or engagement contexts, including:
Qualified vLEI Issuer Authorization vLEI Credential Framework: Defines the QVI AUTH vLEI Credential mechanism that enables LARs to authorize QVIs to issue role credentials, including:
vLEI Ecosystem Governance Framework Glossary: Provides authoritative definitions for all First Letter Capitalized terms used throughout the vLEI ecosystem documentation, ensuring consistent interpretation.
vLEI Risk Assessment: Identifies and evaluates risks across the vLEI ecosystem, including risks specific to role credentials such as:
vLEI Trust Assurance Framework: Maps governance requirements to implementation standards including ISO 20000 certification, vLEI Issuer Qualification Program standards, and vLEI software specifications.
ACDC Specification: Defines the Authentic Chained Data Container format used for all vLEI credentials, including role credentials.
KERI Specification: Defines the Key Event Receipt Infrastructure protocol that provides the cryptographic foundation for vLEI credentials.
CESR Specification: Defines the Composable Event Streaming Representation encoding used for KERI events and ACDC credentials.
IPEX Specification: Defines the Issuance and Presentation Exchange protocol used for vLEI credential issuance and verification workflows.
vLEI JSON Schemas: Technical schema definitions hosted in the GLEIF-IT/vLEI-schema repository:
legal-entity-official-organizational-role-vLEI-credential.jsonlegal-entity-engagement-context-role-vLEI-credential.jsonoor-authorization-vlei-credential.jsonecr-authorization-vlei-credential.jsonvLEI Issuer Qualification Agreement: Contractual agreement between GLEIF and QVIs that establishes:
Information Trust Policies: Comprehensive policies addressing:
While vLEI role credentials are primarily governance constructs, several implementation considerations are critical for developers and system integrators:
Witness Pool Configuration: Role credential issuers must maintain witness pools with:
AID Management: Credential holders must:
KEL and TEL Management: Issuers must:
OOBI Session Implementation: Systems must support:
Digital Identity Credential Verification: Systems should integrate with:
IPEX Protocol Implementation: Applications must support:
Context-Specific Presentation: Applications should support:
Schema Compliance: Implementations must:
Ecosystem Integration: Systems should:
Key Management: Implementations must:
Privacy Protection: Systems should:
Audit and Compliance: Implementations must:
vLEI role credentials represent a sophisticated governance and technical framework for organizational identity and authorization. By combining rigorous identity verification procedures, cryptographic verifiability through KERI infrastructure, and comprehensive governance frameworks, vLEI role credentials enable legal entities to issue verifiable, tamper-evident credentials to their representatives. These credentials provide context-independent proof of authorization, supporting diverse use cases from regulatory compliance to business transactions while maintaining the decentralized, self-sovereign principles of the KERI protocol.
Identity Verification: Organizations implementing vLEI role credential issuance must establish procedures for:
Authorization Workflows: For QVI-mediated issuance:
Credential Management: Organizations must:
Verification Integration: Verifiers must:
Interoperability: Systems should: