Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 70 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
Zero-trust is a security architecture principle that assumes no entity (user, device, or network component) is inherently trustworthy, requiring continuous cryptographic verification of every interaction regardless of location or previous authentication status.
Zero-trust represents a fundamental paradigm shift in security architecture, moving from perimeter-based "castle-and-moat" models to a principle of "never trust, always verify." The core idea is that trust is not granted based on network location, organizational affiliation, or previous authentication—instead, every access request, data exchange, and system interaction must be independently verified through cryptographic proof.
Key properties of zero-trust architecture include:
The scope of zero-trust extends beyond network security to encompass identity verification, data integrity, and authorization decisions. It fundamentally rejects the notion that any component, node, or service should be implicitly trusted based on its position within an infrastructure.
The zero-trust concept emerged from recognition that traditional perimeter security models were fundamentally broken. The "castle-and-moat" approach assumed that threats came from outside the network perimeter, and once inside, entities could be trusted. This model failed catastrophically as:
Implementing zero-trust in KERI-based systems requires careful attention to several governance and architectural considerations:
Organizations must establish clear policies for key generation, storage, and rotation. KERI's pre-rotation mechanism enables recovery from compromise, but controllers must protect their current signing keys and pre-rotated keys appropriately. This typically involves:
Controllers must carefully select and manage their witness pools. While witnesses don't need to be trusted (their outputs are verifiable), the availability and reliability of witnesses affects system availability. Consider:
Verifiers must establish policies for accepting key event logs, including:
Zero-trust KERI systems must integrate with existing infrastructure:
The key principle is that while KERI enables zero-trust verification, organizations must still establish governance frameworks that define how that verification is used in practice.
The term "zero-trust" was popularized by Forrester Research analyst John Kindervag in 2010, though the underlying principles had been developing in security research for years. The NIST Special Publication 800-207 (2020) formalized zero-trust architecture principles, defining it as a security model that acknowledges threats exist both inside and outside traditional network boundaries.
In the context of identity systems, zero-trust emerged as a response to the Universal Secure Attribution Problem—the challenge of proving "who said what" in digital communications without relying on trusted infrastructure. Traditional federated identity systems using PKI-DNS/CA and OAuth were recognized as inadequate because they required trust in certificate authorities, DNS infrastructure, and identity providers.
KERI (Key Event Receipt Infrastructure) embodies zero-trust principles at the identity layer through several fundamental design choices:
KERI establishes autonomic identifiers (AIDs) with a purely cryptographic root-of-trust, eliminating dependence on trusted infrastructure. The identifier is derived directly from the controller's key material through one-way cryptographic functions, creating what KERI calls an "autonomic trust basis." This contrasts with:
KERI's autonomic approach means "if the edges are secure, the security of the middle doesn't matter"—the cryptographic proof is sufficient regardless of the infrastructure used to transmit it.
KERI implements ambient verifiability—the principle that any data can be verified anywhere, at any time, by anybody. This is achieved through:
The KERI specification explicitly states: "It's much easier to protect one's private keys than to protect everyone else's internet infrastructure." This encapsulates the zero-trust philosophy—rather than trusting network security, DNS integrity, or certificate authorities, KERI requires only that controllers protect their own key material.
KERI's infrastructure components operate on zero-trust principles:
These components don't require trust because their outputs are cryptographically verifiable. A malicious witness or watcher can be detected through duplicity evidence.
KERI's discovery mechanism exemplifies zero-trust design. OOBI uses existing internet infrastructure (DNS, URLs, QR codes) for initial discovery but does not trust that infrastructure for authentication:
The OOBI specification explicitly states that "an OOBI itself is not trusted and must be verified" through subsequent in-band KERI mechanisms.
KERI documentation articulates seven core zero-trust principles for autonomic identifier systems:
These principles extend beyond KERI itself to guide the design of KERI-enabled applications.
Zero-trust architecture in KERI enables several critical use cases:
Healthcare Data Exchange: The RACK (Routing, Authentication and Confidentiality with KERI) system implements zero-trust for healthcare integration engines like Mirth Connect. Rather than relying on VPN credentials and perimeter security, RACK uses KERI AIDs to cryptographically verify every data exchange, implementing "Sign Everything" and "Keys at the Edge" paradigms.
Organizational Identity: GLEIF's vLEI (verifiable Legal Entity Identifier) system uses KERI's zero-trust architecture to create a global organizational identity infrastructure. Legal entities receive cryptographically verifiable credentials without depending on trusted certificate authorities or centralized registries.
Supply Chain Provenance: KERI's zero-trust model enables authentic data supply chains where every transformation is cryptographically signed and verifiable, creating end-to-end provenance without trusted intermediaries.
Decentralized Applications: Zero-trust enables truly decentralized applications where clients create their own identifiers, manage their own keys, and authenticate directly with peers, inverting traditional client-server architectures.
The zero-trust approach in KERI provides several advantages:
Elimination of Single Points of Failure: By not depending on DNS, certificate authorities, or centralized identity providers, KERI removes single points of failure that plague traditional PKI systems. DNS hijacking and BGP attacks cannot compromise KERI identifiers because the cryptographic proof is independent of network infrastructure.
Post-Quantum Security: KERI's pre-rotation mechanism provides post-quantum security through cryptographic commitments to future keys. Even if quantum computers break current signature schemes, the one-way hash functions used in pre-rotation remain secure.
Portability: KERI identifiers are truly portable because they don't depend on specific infrastructure. Controllers can change witnesses, move between networks, or switch service providers without changing their identifiers or losing control.
Scalability: Zero-trust verification in KERI is highly scalable because verification is local and doesn't require global consensus. Each verifier can independently validate key event logs without coordinating with other parties.
Ambient Duplicity Detection: The zero-trust architecture enables detection of malicious behavior by anyone, anywhere, at any time. Conflicting key events become evidence of compromise or malicious intent, visible to all participants.
Zero-trust architecture involves important trade-offs:
Complexity: Zero-trust systems are more complex than perimeter-based security. Implementing cryptographic verification for every interaction requires sophisticated key management, event logging, and verification infrastructure.
Key Management Burden: Zero-trust places responsibility for key security on controllers. While KERI provides mechanisms like pre-rotation and delegation to manage this burden, controllers must still protect their key material using appropriate security measures (HSMs, secure enclaves, etc.).
Initial Bootstrap: Zero-trust systems face a "cold start" problem—how to establish initial trust without trusted infrastructure. KERI addresses this through OOBI, but the initial introduction still requires some out-of-band mechanism (QR codes, secure channels, etc.).
Performance Overhead: Cryptographic verification adds computational overhead compared to simple network-based trust. However, modern cryptographic libraries and hardware acceleration make this overhead acceptable for most applications.
User Experience: Zero-trust can create friction in user experience if not carefully designed. KERI addresses this through delegation mechanisms that enable custodial agents to handle routine operations while controllers retain ultimate authority through rotation rights.
The fundamental trade-off is between security and convenience. Zero-trust prioritizes security by requiring cryptographic proof for every interaction, accepting some additional complexity in exchange for eliminating dependence on trusted infrastructure. KERI's design philosophy is "minimally sufficient means"—providing exactly what's necessary for security without unnecessary complexity.