You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: sdk/aca-py/README.md
+37-10
Original file line number
Diff line number
Diff line change
@@ -4,24 +4,51 @@ description: ACA-Py Plugin with cheqd support
4
4
5
5
# 🍊 ACA-Py
6
6
7
-
Aries Cloud Agent Python (ACA-Py) serves as a foundational tool for developing Verifiable Credential (VC) ecosystems. It functions at the second and third layers of the [Trust Over IP framework](https://trustoverip.org/wp-content/uploads/2020/05/toip_050520_primer.pdf) and supports multiple credential formats and protocols. As part of the [Open Wallet Foundation](https://openwallet.foundation/), ACA-Py's capabilities can be expanded with runtime-loaded plug-ins. Explore a diverse range of plug-ins in the [ACA-Py Plugins repository](https://plugins.aca-py.org/latest/).
7
+
**Aries Cloud Agent Python (ACA-Py)** is a powerful and extensible agent framework for building Verifiable Credential (VC) ecosystems. Built on the **Aries RFCs**and aligned with the **Trust Over IP stack**, ACA-Py operates at **Layer 2 (Credential Exchange)** and **Layer 3 (Peer-to-Peer Communication)**.
8
8
9
-
ACA-Py now includes support for the **Cheqd DID** method, facilitating integration with Cheqd's decentralized identity ecosystem. Developers can utilize Cheqd for DID creation, resolution, and operations like issuing and verifying AnonCreds credentials. This offers an easy transition from the decommissioned Sovrin network to a modern, scalable alternative without disrupting existing workflows. Cheqd is fully supported in ACA-Py for issuing Verifiable Credentials, creating Credential Schemas, and Credential Definitions.
9
+
As a project under the **Open Wallet Foundation**, ACA-Py supports dynamic extensions via runtime-loaded plugins, enabling flexible integration into enterprise and SSI platforms.
10
10
11
-
AnonCreds using cheqd are facilitated using the [cheqd AnonCreds Object Method](https://docs.cheqd.io/product/advanced/anoncreds).
11
+
***
12
12
13
-
##**Universal Registrar Integration**
13
+
### DID and Credential Support
14
14
15
-
The Cheqd plugin now supports **dynamic DID registration**using the Universal Registrar. This eliminates the need for separate configurations for different DID methods—users simply need to run the appropriate driver.
***DID method plugins** like `did:peer`, `did:indy`, and `did:cheqd`
18
21
19
-
***Unified DID Support**: Allows multiple DID method registrations (not just Cheqd) through a single interface.
20
-
***Streamlined Setup**: Reduces configuration complexity by dynamically handling DID registrations.
21
-
***Seamless Interoperability**: Integrates effortlessly with supported DID methods.
22
+
***
22
23
23
-
For further configuration and usage examples, refer to the [Universal Registrar GitHub repository](https://github.com/decentralized-identity/universal-registrar).
24
+
### ACA-Py + cheqd: Modern Verifiable Credential Issuance
25
+
26
+
ACA-Py now includes full support for the **`did:cheqd`** method, enabling seamless integration with the **cheqd decentralized identity network**. This allows developers to:
27
+
28
+
* Create and resolve `did:cheqd` identifiers
29
+
* Publish **Credential Schemas** and **Credential Definitions** to cheqd
30
+
* Issue and verify **AnonCreds** credentials using cheqd as the backing ledger
31
+
* Replace legacy `did:sov`/Sovrin usage with a modern, scalable alternative
32
+
33
+
> 💡 AnonCreds on cheqd are enabled via the **cheqd AnonCreds Object Method**, maintaining compatibility with ACA-Py's credential exchange workflows.
34
+
35
+
***
36
+
37
+
### Universal Registrar Integration
38
+
39
+
The **cheqd plugin for ACA-Py** supports dynamic DID registration via the **Universal Registrar**. This provides a streamlined interface for managing multiple DID methods.
40
+
41
+
#### Benefits of Using Universal Registrar:
42
+
43
+
***Unified DID Support**\
44
+
Register multiple DID methods (e.g., `did:cheqd`, `did:key`, `did:web`) through a single unified API.
45
+
***Streamlined Setup**\
46
+
Eliminate manual configuration—DIDs are created dynamically at runtime by calling the relevant driver.
47
+
***Interoperable by Design**\
48
+
Easily switch or support multiple DID methods in the same ACA-Py deployment.
24
49
25
50
## Get started <ahref="#get-started"id="get-started"></a>
26
51
52
+
Get setup with your ACA-Py agent and begin using cheqd's functionality below:
53
+
27
54
<tabledata-view="cards"><thead><tr><th></th><th></th><th></th><thdata-hiddendata-card-targetdata-type="content-ref"></th></tr></thead><tbody><tr><td><markstyle="color:blue;"><strong>cheqd Agent Setup</strong></mark></td><td>Setup the ACA-Py agent with cheqd plugin.</td><td></td><td><ahref="setup-aca-py-agent.md">setup-aca-py-agent.md</a></td></tr><tr><td><markstyle="color:blue;"><strong>Create cheqd DIDs</strong></mark></td><td>Use the agent to create cheqd DIDs.</td><td></td><td><ahref="decentralized-identifiers-dids/create-a-did.md">create-a-did.md</a></td></tr><tr><td><markstyle="color:blue;"><strong>Issue a Credential</strong></mark></td><td>Issue a verifiable credential using ACA-Py agent.</td><td></td><td><ahref="verifiable-credentials-and-presentations/issue-a-verifiable-credential.md">issue-a-verifiable-credential.md</a></td></tr></tbody></table>
Copy file name to clipboardExpand all lines: studio/trust-registries/train/README.md
+9-9
Original file line number
Diff line number
Diff line change
@@ -26,16 +26,16 @@ Together, these components allow for **governance-aware, high-assurance validati
26
26
27
27
When combined, they allow you to:
28
28
29
-
✅ Establish a cryptographically linked trust hierarchy\
30
-
✅ Publish root trust anchors in DNS\
31
-
✅ Automatically validate credentials against published governance frameworks\
32
-
✅ Support scalable, decentralized ecosystems without compromising on assurance
29
+
* Establish a cryptographically linked trust hierarchy
30
+
* Publish root DIDs (rTAOs) in DNS
31
+
* Automatically validate credentials against published governance frameworks
32
+
* Support scalable, decentralized ecosystems without compromising on assurance
33
33
34
34
***
35
35
36
36
## Step-by-Step: Setting Up Trust and Validation
37
37
38
-
### 1. Deploy TDZM
38
+
### 1. Deploy **Trust-DNS Zone Manager (**TDZM)
39
39
40
40
Run the **TDZM backend and UI** using:
41
41
@@ -96,10 +96,10 @@ This enables the TRAIN Trust Validator to resolve and verify the rTAO’s authen
96
96
97
97
Send a JSON request to TTV with the credential’s issuer, type, accreditation path, and optional DNS anchors. TTV will:
98
98
99
-
✅ Traverse the Verifiable Accreditation chain\
100
-
✅ Verify structural and policy compliance\
101
-
✅ Optionally confirm the root via **DNS lookups**\
102
-
✅ Return a structured verification result
99
+
* Traverse the Verifiable Accreditation chain
100
+
* Verify structural and policy compliance
101
+
* Optionally confirm the root via **DNS lookups**
102
+
* Return a structured verification result
103
103
104
104
<tabledata-card-size="large"data-view="cards"><thead><tr><th></th><th></th><thdata-hiddendata-card-targetdata-type="content-ref"></th></tr></thead><tbody><tr><td><markstyle="color:blue;"><strong>Validate Trust Chain</strong></mark></td><td>Validate Trust Chain to a root of trust using the TRAIN Trust Validator (TTV).</td><td><ahref="validate.md">validate.md</a></td></tr></tbody></table>
0 commit comments