The Future of Digital Identity & KERI
Gain working knowledge of the KERI protocol, verifiable credentials, and the Veridian platform
The internet was built without a native identity layer, leaving organizations dependent on stopgap solutions like Public Key Infrastructure (PKI) and blockchain-based Decentralized Identifiers (DIDs) for over 30 years. This course introduces Autonomic Trust, a model where identity is self-certifying, portable, and mathematically verifiable without intermediaries. Across 18 focused units, learners gain a working understanding of the Key Event Receipt Infrastructure (KERI) protocol and how the Veridian platform makes these capabilities accessible and enterprise-ready.
Course overview
Differentiate between Administrative (PKI), Algorithmic (blockchain), and Autonomic (KERI) trust models, and understand the security implications of each approach.
Understand the core components of the KERI protocol, including Autonomic Identifiers (AIDs), Key Event Logs (KELs), Pre-Rotation, Witnesses, and Watchers.
Examine how Authentic Chained Data Containers (ACDCs) enable verifiable trust hierarchies and delegation chains that go beyond standard W3C credentials.
Apply knowledge of the verifiable Legal Entity Identifier (vLEI) system as a real-world, ISO-standardized implementation of KERI operating globally.
Evaluate how the Veridian platform transforms the KERI protocol into enterprise-ready tools, including multi-signature governance, delegation, and wallet and agent architecture.
Identify how KERI-based systems deliver quantum-resistant security and low-to-zero transaction costs compared to PKI and blockchain-based identity alternatives.
Determine how to apply these concepts within organizational strategy, regulatory compliance frameworks, and enterprise infrastructure planning.