Skip to content

Commit af026c0

Browse files
tweeddalexgitbook-bot
authored andcommitted
GITBOOK-381: change request with no subject merged in GitBook
1 parent 16eb09b commit af026c0

File tree

2 files changed

+46
-19
lines changed

2 files changed

+46
-19
lines changed

sdk/aca-py/README.md

+37-10
Original file line numberDiff line numberDiff line change
@@ -4,24 +4,51 @@ description: ACA-Py Plugin with cheqd support
44

55
# 🍊 ACA-Py
66

7-
Aries Cloud Agent Python (ACA-Py) serves as a foundational tool for developing Verifiable Credential (VC) ecosystems. It functions at the second and third layers of the [Trust Over IP framework](https://trustoverip.org/wp-content/uploads/2020/05/toip_050520_primer.pdf) and supports multiple credential formats and protocols. As part of the [Open Wallet Foundation](https://openwallet.foundation/), ACA-Py's capabilities can be expanded with runtime-loaded plug-ins. Explore a diverse range of plug-ins in the [ACA-Py Plugins repository](https://plugins.aca-py.org/latest/).
7+
**Aries Cloud Agent Python (ACA-Py)** is a powerful and extensible agent framework for building Verifiable Credential (VC) ecosystems. Built on the **Aries RFCs** and aligned with the **Trust Over IP stack**, ACA-Py operates at **Layer 2 (Credential Exchange)** and **Layer 3 (Peer-to-Peer Communication)**.
88

9-
ACA-Py now includes support for the **Cheqd DID** method, facilitating integration with Cheqd's decentralized identity ecosystem. Developers can utilize Cheqd for DID creation, resolution, and operations like issuing and verifying AnonCreds credentials. This offers an easy transition from the decommissioned Sovrin network to a modern, scalable alternative without disrupting existing workflows. Cheqd is fully supported in ACA-Py for issuing Verifiable Credentials, creating Credential Schemas, and Credential Definitions.
9+
As a project under the **Open Wallet Foundation**, ACA-Py supports dynamic extensions via runtime-loaded plugins, enabling flexible integration into enterprise and SSI platforms.
1010

11-
AnonCreds using cheqd are facilitated using the [cheqd AnonCreds Object Method](https://docs.cheqd.io/product/advanced/anoncreds).
11+
***
1212

13-
## **Universal Registrar Integration**
13+
### DID and Credential Support
1414

15-
The Cheqd plugin now supports **dynamic DID registration** using the Universal Registrar. This eliminates the need for separate configurations for different DID methods—users simply need to run the appropriate driver.
15+
ACA-Py supports multiple **credential formats** and **DID methods**, including:
1616

17-
### **Key Benefits**
17+
* **AnonCreds**
18+
* **W3C Verifiable Credentials (JSON-LD)**
19+
* **DIDComm v1 & v2**
20+
* **DID method plugins** like `did:peer`, `did:indy`, and `did:cheqd`
1821

19-
* **Unified DID Support**: Allows multiple DID method registrations (not just Cheqd) through a single interface.
20-
* **Streamlined Setup**: Reduces configuration complexity by dynamically handling DID registrations.
21-
* **Seamless Interoperability**: Integrates effortlessly with supported DID methods.
22+
***
2223

23-
For further configuration and usage examples, refer to the [Universal Registrar GitHub repository](https://github.com/decentralized-identity/universal-registrar).
24+
### ACA-Py + cheqd: Modern Verifiable Credential Issuance
25+
26+
ACA-Py now includes full support for the **`did:cheqd`** method, enabling seamless integration with the **cheqd decentralized identity network**. This allows developers to:
27+
28+
* Create and resolve `did:cheqd` identifiers
29+
* Publish **Credential Schemas** and **Credential Definitions** to cheqd
30+
* Issue and verify **AnonCreds** credentials using cheqd as the backing ledger
31+
* Replace legacy `did:sov`/Sovrin usage with a modern, scalable alternative
32+
33+
> 💡 AnonCreds on cheqd are enabled via the **cheqd AnonCreds Object Method**, maintaining compatibility with ACA-Py's credential exchange workflows.
34+
35+
***
36+
37+
### Universal Registrar Integration
38+
39+
The **cheqd plugin for ACA-Py** supports dynamic DID registration via the **Universal Registrar**. This provides a streamlined interface for managing multiple DID methods.
40+
41+
#### Benefits of Using Universal Registrar:
42+
43+
* **Unified DID Support**\
44+
Register multiple DID methods (e.g., `did:cheqd`, `did:key`, `did:web`) through a single unified API.
45+
* **Streamlined Setup**\
46+
Eliminate manual configuration—DIDs are created dynamically at runtime by calling the relevant driver.
47+
* **Interoperable by Design**\
48+
Easily switch or support multiple DID methods in the same ACA-Py deployment.
2449

2550
## Get started <a href="#get-started" id="get-started"></a>
2651

52+
Get setup with your ACA-Py agent and begin using cheqd's functionality below:
53+
2754
<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><mark style="color:blue;"><strong>cheqd Agent Setup</strong></mark></td><td>Setup the ACA-Py agent with cheqd plugin.</td><td></td><td><a href="setup-aca-py-agent.md">setup-aca-py-agent.md</a></td></tr><tr><td><mark style="color:blue;"><strong>Create cheqd DIDs</strong></mark></td><td>Use the agent to create cheqd DIDs.</td><td></td><td><a href="decentralized-identifiers-dids/create-a-did.md">create-a-did.md</a></td></tr><tr><td><mark style="color:blue;"><strong>Issue a Credential</strong></mark></td><td>Issue a verifiable credential using ACA-Py agent.</td><td></td><td><a href="verifiable-credentials-and-presentations/issue-a-verifiable-credential.md">issue-a-verifiable-credential.md</a></td></tr></tbody></table>

studio/trust-registries/train/README.md

+9-9
Original file line numberDiff line numberDiff line change
@@ -26,16 +26,16 @@ Together, these components allow for **governance-aware, high-assurance validati
2626

2727
When combined, they allow you to:
2828

29-
Establish a cryptographically linked trust hierarchy\
30-
Publish root trust anchors in DNS\
31-
Automatically validate credentials against published governance frameworks\
32-
Support scalable, decentralized ecosystems without compromising on assurance
29+
* Establish a cryptographically linked trust hierarchy
30+
* Publish root DIDs (rTAOs) in DNS
31+
* Automatically validate credentials against published governance frameworks
32+
* Support scalable, decentralized ecosystems without compromising on assurance
3333

3434
***
3535

3636
## Step-by-Step: Setting Up Trust and Validation
3737

38-
### 1. Deploy TDZM
38+
### 1. Deploy **Trust-DNS Zone Manager (**&#x54;DZM)
3939

4040
Run the **TDZM backend and UI** using:
4141

@@ -96,10 +96,10 @@ This enables the TRAIN Trust Validator to resolve and verify the rTAO’s authen
9696

9797
Send a JSON request to TTV with the credential’s issuer, type, accreditation path, and optional DNS anchors. TTV will:
9898

99-
Traverse the Verifiable Accreditation chain\
100-
Verify structural and policy compliance\
101-
Optionally confirm the root via **DNS lookups**\
102-
Return a structured verification result
99+
* Traverse the Verifiable Accreditation chain
100+
* Verify structural and policy compliance
101+
* Optionally confirm the root via **DNS lookups**
102+
* Return a structured verification result
103103

104104
<table data-card-size="large" data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><mark style="color:blue;"><strong>Validate Trust Chain</strong></mark></td><td>Validate Trust Chain to a root of trust using the TRAIN Trust Validator (TTV).</td><td><a href="validate.md">validate.md</a></td></tr></tbody></table>
105105

0 commit comments

Comments
 (0)