Skip to content

GLEIF-IT/reg-poc

Repository files navigation

reg-poc

Proof of concept for ECR login, file upload and verification.

Build

docker-compose up --build

Run

Navigate to https://localhost:5173/ in your browser.

Use the passcode 0123456789abcdefghijk.

Upload

Samples can be found under the samples/ directory.

Architecture

This brings together all the moving pieces inside this PoC.

architectture

  • Witness network (keripy)
    • The KERI witness network provides a receipt service for identifiers (AIDs) in the network. These receipts provide the public cryptographic verifiability to determine that an AID has consistent key event state. Phrased another way, the witness network is a set of servers that collectively allow watchers/verifiers to detect duplicity of key events for an AID. Duplicity means the cryptographic verifiablility of an AID is ambiguous. When an AID is created (incepted) it specifies witnesses that it trusts to provide signed receipts of all of the key events of the AID. We call this state the Key Event Log (KEL) and when the witness network provides receipts for each event, it is called a Key Event Receipt Log (KERL). Witness networks are decentralized, meaning anyone (organization, person, government, etc) can stand-up a witness network for the KERI protocol. The user of an AID specifies the witnesses that it trusts to provide receipts for it's key events, both at inception and during any rotations. That means the AID has cryptographically committed to those witnesses to provide the KERLs for that AID. GLEIF hosts a witness network. Provenant (GLEIF QVI) hosts a witness network. Other organizations, QVIs, governments will host witness networks of their own.
  • vLEI server (cached schema) (vLEI)
    • The vLEI server hosts vLEI specific information like the schemas of the vLEI credentials. In order to properly present, verify, and process a vLEI credential, you need to know the schema (fields, types, structure, etc). You can see the different vLEI credential schemas here. This vLEI specific information sits on top of the generic KERI protocol, providing the information necessary for vLEI users to participate and verify one another's vLEI credentials. Note that even credential schemas are verifiable in KERI/ACDCs. This is an important aspect of end-verifiability that prevents several attacks on credentials. You can see the tamper-evident self-addressing identifiers (SAIDs) here.
  • KERI Agent (KERIA)
    • KERIA is the cloud agent server for KERI clients that use Signify. Signify clients are minimally sufficient clients that only provide user cryptographic operations, like digitally signing, from their edge devices. KERIA provides a persistent service where all other KERI operations necessary for the client to participate in the KERI/vLEI ecosystem. It is important to understand that a Signify client never shares its key secrets with the KERIA agent. And that all information, like additional keys, are encrypted on the KERIA agent storage so that it cannot by compromised on the server. This design allows clients to retain self-sovereign control of their cryptographic keys, while at the same time allowing the Signify client to be incredibly light-weight. KERIA provides the secure API to create identifiers (managed AIDs), present credentials, manage asynchronous operations like coordinating/waiting for signatures from other participants in a multi-sig operation, and much more. Signify clients send API calls to their KERIA server from web pages, IoT devices, mobile phones, etc.
  • reg-poc-webapp
    • The webapp provides the web UI for our users. It is a Signify client that uses signify-ts that allows users to securely interact with KERIA, the server backend, and the verifier service. The user logs into the portal by supplying a password to unlock it's KERIA agent to retrieve the identifier and vLEI credential that allows them to submit signed reports. image
    • After login, the user can upload signed reports or check that status of reports they previously submitted. All of these server API calls are secured with Signify signed headers. image
    • The user uploads reports by selecting a properly formatted zip file containing the report files and report metadata which includes the report signatures. image
    • The user checks that status of their uploaded reports from the status page. image
  • reg-poc-server
    • The server backend provides the secure API for verifying the user identifier and vLEI credential role, uploading reports, verifying signatures, and checking the status of uploaded reports. You can see the list of API calls from the swagger API page and we provide example values to test these operations: image
    • The server itself doesn't provide KERI functionality. The webapp contains a Signify client that uses a KERIA agent. And the actual signature verification on request headers and the uploaded reports is done by the verifier service.
  • reg-poc-verifier

Data

The data directory contains the output from a signifypy script that establishes the Root of Trust, Qualified vLEI Issuer, Legal Entity, ECR Auth and ECR credentials here.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published