Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support externally-controlled DIDs with verification method keys in Guardian #2678

Closed
anvabr opened this issue Sep 21, 2023 · 0 comments
Closed
Assignees
Labels

Comments

@anvabr
Copy link
Collaborator

anvabr commented Sep 21, 2023

Problem description

Current mode of Guardian operation assumes local storage of DIDs keys. There is much flexibility wrt what technology is used to store these keys (Hashicorp is often used in UAT/PROD, local DB usually used for local dev instances, etc) however in all cases the keys are controlled by the Guardian. In many use-cases DIDs for Standard Registry is a very important and a heavily guarded asset, in PROD such organisations would likely be reluctant to deploy the main keys into Guardian.

Requirements

Introduce a workflow into the Guardian where a DID Controller would introduce a dedicated verification method into the main DID for which the private key would be stored and managed by a Guardian instance. This way Guardian would only be able to control the specific verification method's key, but not the rest of the DID.

Definition of done

  • Functionality implemented
  • Documentation updated accordingly
  • Demo videos etc updated accordingly

Acceptance criteria

It is possible to import an existing private key of the DID's verification method into Guardian such that it would then seamlessly work as usual for all the tasks as before.

@anvabr anvabr changed the title Support externally-controlled DIDs with keys in Guardian Support externally-controlled DIDs with verification method keys in Guardian Oct 2, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants