This document explains Controller Documents (also known as Controlled Identifier Documents), a core concept in the W3C Controlled Identifier (CID) specification. Controller Documents serve as the foundation for verifiable cryptographic interactions in the Vidos ecosystem.
Controller Documents are machine-readable documents that contain cryptographic material and service endpoints used to verify proofs from, and interact with, the controller of an identifier. In essence, they establish a trust anchor by providing the verification methods necessary to validate that someone has authority over a specific identifier.
Controller Documents are closely related to DID Documents in the Decentralized Identifiers ecosystem, serving as a more generalized concept that DID Documents implement.
Think of a Controller Document as a digital identity card that doesn't contain personal information but instead holds the cryptographic keys and service information needed to:
Controller Documents enable secure, verifiable interactions without requiring centralized authorities to validate identity claims.
A Controller Document consists of several key components:
Every Controller Document includes identifiers that establish its context:
id
property.Verification methods provide the cryptographic material necessary to verify proofs created by or on behalf of the subject. They typically include:
Each verification method has:
Verification relationships express how specific verification methods can be used for different purposes:
These relationships allow precise control over which keys can be used for which operations.
Services define endpoints for interacting with the subject beyond cryptographic verification:
Services might include verification credential issuers, messaging endpoints, or data storage locations.
Controller Documents follow a structured data model with standardized properties:
The Controller Document can be represented in different formats, with JSON and JSON-LD being the most common. Each format must preserve the complete data model.
Within the Vidos ecosystem, Controller Documents play a crucial role in the verification workflow:
When a verification operation is initiated, the system first needs to access the Controller Document associated with the relevant identifier:
This process establishes trust without requiring centralized identity providers. The resolution process follows patterns similar to DID Resolution but is generalized to work with various identifier types.
Controller Documents interact with several core Vidos services:
The Resolver Service translates identifiers into their associated Controller Documents, making them available for verification operations. It supports multiple methods for resolving different types of identifiers, similar to how DID resolvers work with DID Methods.
The Verifier Service uses the cryptographic material in Controller Documents to verify digital signatures, credentials, and other claims. It relies on the Resolver to access the appropriate verification methods.
The Validator Service ensures that Controller Documents and associated credentials conform to expected schemas and business rules before they're processed by other services.
The Authorizer Service uses verification methods from Controller Documents to authenticate entities and authorize access to protected resources.
The Library Service provides reusable components for working with Controller Documents across different applications and services.
Controller Documents enable several key verification scenarios:
By providing cryptographic proof of control over an identifier, Controller Documents allow secure authentication without passwords or centralized identity providers. This aligns with the authentication verification relationship defined in the specification.
When verifying credentials, systems use the verification methods in Controller Documents to validate that signatures were created with the corresponding private keys.
Controller Documents provide the public keys needed for establishing encrypted communication channels with the subject or controller.
Through service endpoints, Controller Documents offer a standardized way to discover how to interact with an identifier beyond cryptographic operations. This functions similarly to service endpoints in DID Documents.
Verification relationships in Controller Documents define which keys can be used for specific operations, enabling precise access control.
Controller Documents provide several advantages for verification systems:
By separating cryptographic material from centralized authorities, Controller Documents enable self-sovereign control over digital identifiers.
Controller Documents establish a foundation for cryptographically verifiable digital relationships without relying on trusted intermediaries.
The standardized structure of Controller Documents enables interoperability across different systems, networks, and applications.
Controller Documents contain no personal data, only the cryptographic and service information needed for secure interaction.
Controller Documents can be updated to incorporate new cryptographic methods as technology evolves, providing long-term security.
Controller Documents are foundational elements of decentralized verification systems. They provide the cryptographic material and service information needed for secure, verifiable interactions while maintaining privacy and decentralized control.
In the Vidos ecosystem, Controller Documents facilitate the connections between identifiers and verification methods, enabling a comprehensive trust framework built on open standards. By implementing the W3C Controlled Identifier specification, Vidos ensures interoperability with the broader ecosystem of verifiable credentials and decentralized identifiers.