<?xml version="1.0" encoding="utf-8"?>
<rfc version="3" ipr="trust200902" category="info" docName="draft-xzinn-idns-architecture-00">
  
  
  
  
  <front>
    
    
    
    
    <title>Identity Namespace Architecture</title>
    
    
    
    <author fullname="Xavier Zinn" surname="Zinn" initials="X.">
  <organization>Independent</organization>
  <address>
    <email>xavier.zinn@gmail.com</email>
  </address>
</author>

    
    
    <date year="2026" month="01" day="18"/>
    
    <abstract>
      
      
      
      
      <t>This document defines the Identity Namespace architecture.</t>
      
      
    
    
    </abstract>
    
    
  
  
    
  </front>
  
  
  
  
  <middle>
    
    
    
    
    <section title="Introduction">
      
      

      
      
      <t># Abstract</t>
      
      
      <t>This document defines an Identity Namespace Architecture that establishes globally unique, cryptographically verifiable identifiers and their associated trust boundaries. The architecture specifies namespace structure, resolution semantics, and authority separation without prescribing specific transports or cryptographic algorithms. It is intended to serve as a foundational identity substrate for higher level protocols and enforcement mechanisms.</t>
      
      
      <t># Introduction</t>
      
      
      <t>The Identity Namespace System Architecture (INSA) defines a cryptographically verifiable
framework for the representation, publication, and resolution of human and institutional
identities. INSA is designed to provide a durable identity substrate that is independent
of transport protocols, application layers, and communication mechanisms.</t>
      
      
      <t>Existing identity systems frequently conflate identity with authentication, messaging,
directory services, or application-specific account models. This coupling introduces
systemic fragility, centralization pressure, and opaque trust dependencies. INSA explicitly
rejects this approach by isolating identity semantics and ownership from all higher-layer
concerns.</t>
      
      
      <t>At its core, INSA provides a mechanism by which an identity may be uniquely anchored to
cryptographic material, published under a sovereign trust boundary, resolved without prior
trust relationships, and independently verified without reliance on centralized
intermediaries.</t>
      
      
      <t>The architecture is intentionally minimal. INSA does not prescribe user interfaces,
storage backends, transport protocols, or application workflows. Instead, it defines the
smallest set of primitives required to support long-lived, verifiable identity in a
globally distributed environment.</t>
      
      
      <t>INSA distinguishes between canonical identities and subordinate identities. Canonical
identities represent long-lived personhood and are anchored by cryptographic keys generated
and controlled by the identity holder. Subordinate identities represent institutionally
governed roles issued under explicit authorization and accountability structures. This
separation enables institutions to assert role-based authority without subsuming or
controlling the underlying human identity.</t>
      
      
      <t>Identity information within INSA is expressed through signed manifests and published into
Merkle-rooted registries operated by sovereign authorities. These registries allow relying
parties to verify identity inclusion and integrity using cryptographic proofs rather than
trust in online services or proprietary directories. Resolution is designed to be
stateless, allowing independent verifiers to operate without synchronized databases or
persistent connections to identity operators.</t>
      
      
      <t>INSA deliberately excludes endpoint discovery, messaging, session establishment, and
communication semantics. While identity identifiers may be used as stable references by
higher-layer systems, the architecture itself does not define how communication occurs, how
messages are routed, or how presence is established. These concerns are addressed in
separate companion specifications.</t>
      
      
      <t>The primary design goals of INSA are durability, verifiability, and sovereignty. Identities
are intended to persist across decades, survive institutional change, and remain
independently verifiable even when originating authorities are offline. By grounding
identity in cryptographic proofs and explicit governance boundaries, INSA aims to provide an
identity substrate suitable for civil, commercial, and personal use without reliance on
centralized platforms.</t>
      
      
      <t>This document specifies the architectural components, trust model, namespace structure,
and resolution semantics of INSA. It does not define application profiles or operational
policies beyond those required for interoperability and security.</t>
      
      
      <t># Terminology</t>
      
      
      <t>The key words **MUST**, **MUST NOT**, **REQUIRED**, **SHALL**, **SHALL NOT**, **SHOULD**,
**SHOULD NOT**, **RECOMMENDED**, **MAY**, and **OPTIONAL** in this document are to be
interpreted as described in &lt;&lt;rfc2119&gt;&gt; and &lt;&lt;rfc8174&gt;&gt;.</t>
      
      
      <t>The following terms are used throughout this document.</t>
      
      
      <t>**Identity**  
  A persistent representation of a human or institutional entity, anchored by
  cryptographic material and governed by explicit authority.</t>
      
      
      <t>* **Canonical Identity**  
  A long-lived identity representing a real human. A canonical identity is anchored by a
  public key generated and controlled by the identity holder and published under a
  sovereign namespace. Canonical identities persist independently of institutional roles,
  employment, or affiliations.</t>
      
      
      <t>* **Subordinate Identity**  
  An identity representing an institutionally governed role associated with a canonical
  identity. Subordinate identities are issued, renewed, and revoked by role authorities and
  are subject to institutional policy and accountability.</t>
      
      
      <t>* **Sovereign Operator**  
  An authority responsible for operating a sovereign identity namespace and publishing a
  Merkle-rooted registry of canonical identity manifests. A sovereign operator defines the
  trust boundary for canonical identity issuance and governance within its namespace.</t>
      
      
      <t>* **Role Authority**  
  An institution authorized to issue and manage subordinate identities within a sovereign
  namespace. A role authority asserts institutional accountability for actions performed
  under subordinate identities it issues.</t>
      
      
      <t>* **Manifest**  
  A signed, structured document describing identity attributes, cryptographic keys,
  governance metadata, and lineage information. Manifests are the primary data objects
  published and resolved within INSA.</t>
      
      
      <t>* **Canonical Manifest**  
  A manifest describing a canonical identity. Canonical manifests are published into
  sovereign identity trees and include the canonical public key, optional descriptive
  attributes, lineage metadata, and sovereign operator attestation.</t>
      
      
      <t>* **Subordinate Manifest**  
  A manifest describing a subordinate identity. Subordinate manifests include role
  identifiers, capability bindings, validity periods, and dual attestations from both the
  canonical identity holder and the issuing role authority.</t>
      
      
      <t>* **Capability**  
  A cryptographically verifiable authorization describing a set of permitted actions.
  Capabilities are bound to subordinate identities and evaluated independently by relying
  systems.</t>
      
      
      <t>* **Sovereign Identity Tree**  
  A Merkle-rooted registry containing canonical identity manifests operated by a sovereign
  operator. Each tree version is committed by a signed Merkle root, enabling inclusion
  proofs and stateless verification.</t>
      
      
      <t>* **Merkle Root**  
  The cryptographic commitment representing the state of a sovereign identity tree at a
  specific point in time. The Merkle root is signed by the sovereign operator and published
  as authoritative metadata.</t>
      
      
      <t>* **Inclusion Proof**  
  A cryptographic proof demonstrating that a specific manifest is included within a given
  Merkle root. Inclusion proofs allow relying parties to verify identity membership without
  access to the full identity tree.</t>
      
      
      <t>* **Resolver**  
  A software component that retrieves identity manifests, Merkle roots, and inclusion
  proofs, and performs cryptographic verification of identity data. Resolvers operate
  without requiring trust in the source of retrieved data.</t>
      
      
      <t>* **RATB (User-Controlled Trust Broker)**  
  A user-controlled cryptographic component responsible for safeguarding private keys,
  performing signature operations, and enforcing local policy. The RATB MAY be implemented
  using hardware or software mechanisms and is not required to be network-accessible.</t>
      
      
      <t>* **Namespace Suffix**  
  A globally unique identifier designating a sovereign identity namespace, such as
  `ca.id`. Namespace suffixes define trust boundaries and publication authority.</t>
      
      
      <t>* **Resolution**  
  The process of retrieving identity data and verifying its authenticity and integrity
  using cryptographic proofs and signed metadata.</t>
      
      
      <t>* **Relying Party**  
  An entity that consumes resolved identity information to make authorization,
  authentication, or policy decisions.</t>
      
      
      <t>* **Companion Specification**  
  A separate document defining functionality intentionally excluded from INSA, such as
  endpoint discovery, messaging, or communication profiles.</t>
      
      
      <t>These terms are used normatively throughout this document to define the architecture and
behavior of the Identity Namespace System Architecture.</t>
      
      
      <t># Architectural Overview</t>
      
      
      <t>The Identity Namespace System Architecture is composed of a small set of layered components
that together enable durable, verifiable identity publication and resolution. Each layer
has a clearly defined responsibility and interacts with adjacent layers through explicit,
cryptographically verifiable artifacts.</t>
      
      
      <t>The architecture is intentionally non-interactive. No component is required to maintain
session state, trust live network services, or participate in global consensus. All trust
decisions are derived from verifiable data objects and signed commitments.</t>
      
      
      <t>## Architectural Layers</t>
      
      
      <t>INSA is organized into the following conceptual layers:</t>
      
    
    </section>
    
    
    <section title="Problem Statement">
      
      
      <t>* Sovereign Identity Tree Layer  
* Canonical Identity Layer  
* Subordinate Identity Layer  
* Capability Layer  
* Resolution Layer</t>
      
      
      <t>Each layer MAY be implemented independently, provided that the required data formats and
verification semantics are preserved.</t>
      
      
      <t>## Sovereign Identity Tree Layer</t>
      
      
      <t>The Sovereign Identity Tree Layer provides the authoritative publication mechanism for
canonical identities. A sovereign operator maintains a Merkle-rooted registry containing
canonical identity manifests.</t>
      
      
      <t>Each update to the registry produces a new Merkle root. The sovereign operator MUST sign
each Merkle root and make it available to relying parties. The signed Merkle root represents
a cryptographic commitment to the complete set of canonical identities published at that
point in time.</t>
      
      
      <t>Sovereign identity trees do not require real-time availability. Relying parties MAY obtain
Merkle roots and inclusion proofs from untrusted sources and verify them independently.</t>
      
      
      <t>## Canonical Identity Layer</t>
      
      
      <t>The Canonical Identity Layer defines the representation of long-lived human identities.
Each canonical identity is anchored by a public key generated and controlled by the
identity holder.</t>
      
      
      <t>Canonical identity manifests describe the canonical public key, optional descriptive
attributes, and lineage metadata required to support key rotation and continuity. Canonical
manifests MUST be included in a sovereign identity tree to be considered valid.</t>
      
      
      <t>The sovereign operator attests to inclusion and governance of canonical identities but does
not control the private keys associated with them.</t>
      
      
      <t>## Subordinate Identity Layer</t>
      
      
      <t>The Subordinate Identity Layer enables institutions to issue role-based identities without
assuming control of the underlying human identity.</t>
      
      
      <t>Subordinate identities are represented by subordinate manifests issued under dual
attestation. A subordinate manifest MUST be signed by both the canonical identity holder
and the issuing role authority.</t>
      
      
      <t>Subordinate identities MAY be renewed, revoked, or replaced independently of the canonical
identity. Revocation of a subordinate identity does not affect the validity of the
canonical identity.</t>
      
      
      <t>## Capability Layer</t>
      
      
      <t>The Capability Layer defines fine-grained authorization semantics associated with
subordinate identities. Capabilities describe the actions a subordinate identity is
authorized to perform and the conditions under which those actions are valid.</t>
      
      
      <t>Capabilities are bound to subordinate identities and evaluated by relying parties during
authorization decisions. INSA does not define a global capability language; it defines only
the cryptographic binding and verification model.</t>
      
      
      <t>## Resolution Layer</t>
      
      
      <t>The Resolution Layer defines how identity data is retrieved and verified. Resolution
consists of obtaining identity manifests, signed Merkle roots, and inclusion proofs, then
performing cryptographic verification.</t>
      
      
      <t>Resolvers MUST verify:</t>
      
      
      <t>* the signature on the Merkle root
* the validity of the inclusion proof
* the signatures on resolved manifests
* the binding between canonical and subordinate identities</t>
      
      
      <t>Resolvers do not require direct trust in sovereign operators, role authorities, or
distribution infrastructure. All retrieved data MAY be cached, mirrored, or transported
through untrusted channels.</t>
      
      
      <t>## Separation of Concerns</t>
      
      
      <t>INSA explicitly separates identity from authentication protocols, messaging systems,
transport mechanisms, and application logic. While identity identifiers may be used by
higher-layer systems, INSA does not define how identities are authenticated in sessions or
how messages are exchanged.</t>
      
      
      <t>This separation allows INSA to serve as a stable substrate across diverse technical and
institutional environments without imposing application-level constraints.</t>
      
      
      <t>## Extensibility</t>
      
      
      <t>INSA is designed to be extensible through companion specifications. Additional documents
may define endpoint discovery, communication profiles, application bindings, or sector-
specific policies without modifying the core architecture defined in this document.</t>
      
      
      <t>Such extensions MUST NOT alter the semantics of canonical identities, subordinate identities,
or sovereign identity trees as defined herein.</t>
      
      
      <t># Sovereign Identity Namespace Model</t>
      
      
      <t>INSA organizes canonical identities within sovereign identity namespaces. A sovereign
identity namespace defines the trust boundary under which canonical identities are issued,
governed, and published. Each namespace is operated by a sovereign operator and identified
by a globally unique namespace suffix.</t>
      
      
      <t>The namespace model is designed to support decentralization, jurisdictional diversity, and
explicit governance without introducing global coordination requirements.</t>
      
      
      <t>## Namespace Suffixes</t>
      
      
      <t>Each sovereign identity namespace is identified by a namespace suffix, such as `ca.id`.
Namespace suffixes are globally unique identifiers that establish authority over canonical
identity publication within their scope.</t>
      
      
      <t>Namespace suffixes do not imply naming uniqueness at the human-readable level. Human-readable
labels MAY collide across namespaces or within a namespace without affecting cryptographic
identity uniqueness.</t>
      
      
      <t>## Authority and Trust Boundaries</t>
      
      
      <t>A sovereign operator is authoritative only within the namespace suffix it operates. Trust
in a sovereign operator does not imply trust in any other operator.</t>
      
      
      <t>Relying parties MAY choose to trust multiple sovereign operators concurrently or restrict
trust to a specific set of namespaces based on policy, jurisdiction, or application context.</t>
      
      
      <t>INSA does not define a global root authority or hierarchical trust chain across sovereign
operators.</t>
      
      
      <t>## Canonical Identity Allocation</t>
      
      
      <t>Within a sovereign namespace, canonical identities are allocated according to policies
defined by the sovereign operator. These policies MAY include identity proofing,
registration requirements, or governance constraints.</t>
      
    
    </section>
    
    
    <section title="Threat Model">
      
      
      <t>INSA does not mandate any specific identity proofing process. The architecture assumes only
that canonical identity manifests published within a sovereign identity tree are governed
by the operator responsible for that namespace.</t>
      
      
      <t>## Name Ambiguity and Human Readability</t>
      
      
      <t>Human-readable labels associated with canonical identities are descriptive attributes and
are not treated as unique identifiers. Multiple canonical identities MAY share identical
human-readable names without ambiguity at the cryptographic level.</t>
      
      
      <t>Relying parties MUST NOT assume uniqueness of human-readable labels. Cryptographic keys and
manifest identifiers are the sole authoritative identity anchors.</t>
      
      
      <t>## Delegation to Role Authorities</t>
      
      
      <t>Sovereign operators MAY delegate authority to institutions to issue subordinate identities
within their namespace. Such delegation does not transfer control over canonical identities.</t>
      
      
      <t>Delegated role authorities operate under the governance constraints of the sovereign
operator and are accountable for subordinate identities they issue.</t>
      
      
      <t>## Namespace Evolution</t>
      
      
      <t>Namespace suffixes and governance policies MAY evolve over time. Changes to namespace
policies MUST NOT invalidate previously issued canonical identities unless explicitly
revoked under sovereign authority.</t>
      
      
      <t>INSA requires that sovereign operators provide continuity guarantees for canonical
identities across namespace evolution events.</t>
      
      
      <t>## Cross-Namespace Resolution</t>
      
      
      <t>INSA does not require resolvers to possess prior knowledge of all namespace suffixes.
Resolvers MAY obtain namespace metadata dynamically or through local policy configuration.</t>
      
      
      <t>Cross-namespace resolution does not imply cross-namespace trust. Each resolved identity
MUST be evaluated independently according to the relying party's trust policy.</t>
      
      
      <t># Canonical Identity</t>
      
      
      <t>Canonical identities represent long-lived human identities within INSA. A canonical
identity is intended to persist across institutional affiliations, employment changes,
and application contexts. Canonical identities form the foundational layer upon which all
subordinate identities and institutional roles are built.</t>
      
      
      <t>Canonical identities are governed within sovereign identity namespaces but are not owned
or controlled by institutions.</t>
      
      
      <t>## Canonical Public Key</t>
      
      
      <t>Each canonical identity is anchored by a canonical public key. The canonical public key
serves as the primary cryptographic identifier for the identity.</t>
      
      
      <t>The corresponding private key MUST be generated and controlled by the identity holder.
Sovereign operators and institutions MUST NOT generate or retain private keys associated
with canonical identities.</t>
      
      
      <t>Loss of control over a canonical private key constitutes loss of control over the
associated identity and therefore represents a critical security event.</t>
      
      
      <t>## Canonical Manifest</t>
      
      
      <t>Canonical identities are described by canonical manifests. A canonical manifest is a
signed data structure that includes, at a minimum:</t>
      
      
      <t>* the canonical public key
* a manifest identifier
* optional descriptive attributes
* lineage metadata
* a validity interval or issuance timestamp
* sovereign operator attestation</t>
      
      
      <t>Canonical manifests MUST be signed by the canonical private key and attested by the
sovereign operator through inclusion in a sovereign identity tree.</t>
      
      
      <t>## Descriptive Attributes</t>
      
      
      <t>Descriptive attributes associated with canonical identities MAY include human-readable
names, photographs, or other metadata. Such attributes are non-authoritative and MUST NOT
be treated as identity anchors.</t>
      
      
      <t>Descriptive attributes MAY change over time without affecting the continuity of the
canonical identity.</t>
      
      
      <t>## Key Rotation and Continuity</t>
      
      
      <t>Canonical identities support key rotation to mitigate key compromise and cryptographic
obsolescence. Key rotation is achieved through issuance of a new canonical manifest that
references the previous canonical key via lineage metadata.</t>
      
      
      <t>Lineage metadata MUST cryptographically bind successive canonical keys to preserve
identity continuity. Relying parties MUST validate lineage chains when resolving rotated
canonical identities.</t>
      
      
      <t>Rotation of a canonical key MUST NOT require issuance of a new identity unless explicitly
mandated by sovereign policy.</t>
      
      
      <t>## Revocation and Invalidity</t>
      
      
      <t>Revocation of a canonical identity is an exceptional event and is governed by sovereign
operator policy. Revocation MAY occur in cases of fraud, legal mandate, or explicit
identity holder request.</t>
      
      
      <t>Revocation of a canonical identity invalidates all subordinate identities derived from it.</t>
      
      
      <t>## Sovereign Operator Role</t>
      
      
      <t>Sovereign operators are responsible for governing canonical identity issuance, revocation,
and publication. Sovereign operators attest to canonical identity inclusion but do not
participate in authentication or usage of canonical identities.</t>
      
      
      <t>Sovereign operators MUST publish signed Merkle roots and associated metadata sufficient
to allow independent verification of canonical identity inclusion.</t>
      
      
      <t>## Independence from Institutions</t>
      
      
      <t>Canonical identities are independent of institutional systems and roles. Institutions
MUST NOT require transfer or escrow of canonical private keys as a condition of service or
employment.</t>
      
      
      <t>This separation preserves human identity sovereignty while enabling institutional
accountability through subordinate identities.</t>
      
    
    </section>
    
    
    <section title="Identity Pressure">
      
      
      <t># Subordinate Identity</t>
      
      
      <t>Subordinate identities represent institutionally governed roles associated with a canonical
identity. Subordinate identities enable organizations to assert authority, responsibility,
and accountability for actions performed by individuals without assuming control over the
underlying human identity.</t>
      
      
      <t>Subordinate identities are explicitly scoped, time-bounded, and revocable.</t>
      
      
      <t>## Role-Based Identity Model</t>
      
      
      <t>A subordinate identity corresponds to a specific role, function, or capacity within an
institutional context. Examples include employment roles, professional certifications,
delegated authorities, or operational permissions.</t>
      
      
      <t>Subordinate identities are not intended to persist indefinitely and MAY be replaced,
renewed, or revoked according to institutional policy.</t>
      
      
      <t>## Dual Attestation</t>
      
      
      <t>Creation of a subordinate identity requires dual attestation. A subordinate manifest MUST
be signed by:</t>
      
      
      <t>* the canonical identity holder, indicating acceptance of the role
* the issuing role authority, indicating institutional authorization</t>
      
      
      <t>Dual attestation establishes explicit accountability for both the human actor and the
issuing institution.</t>
      
      
      <t>## Subordinate Manifest</t>
      
      
      <t>A subordinate manifest is a signed data structure that includes, at a minimum:</t>
      
      
      <t>* a reference to the associated canonical identity
* a role identifier
* one or more bound capabilities
* validity constraints such as time limits or conditions
* signatures from both the canonical identity holder and the role authority</t>
      
      
      <t>Subordinate manifests MAY include additional metadata defined by institutional policy.</t>
      
      
      <t>## Renewal and Revocation</t>
      
      
      <t>Subordinate identities MAY be renewed by issuance of a new subordinate manifest. Renewal
does not require modification of the canonical identity.</t>
      
      
      <t>Revocation of a subordinate identity MUST be performed by the issuing role authority and
MUST be discoverable by relying parties during resolution.</t>
      
      
      <t>Revocation of a subordinate identity does not affect the validity of the associated
canonical identity.</t>
      
      
      <t>## Accountability and Attribution</t>
      
      
      <t>Actions performed under a subordinate identity are attributable to both the canonical
identity holder and the issuing role authority.</t>
      
      
      <t>Relying parties SHOULD record both attestations when logging or auditing actions performed
under subordinate identities.</t>
      
      
      <t>## Separation from Canonical Identity</t>
      
      
      <t>Subordinate identities do not confer ownership or control over the canonical identity.
Institutions MUST NOT require disclosure of canonical private keys or enforce key escrow
as a condition of subordinate identity issuance.</t>
      
      
      <t>This separation preserves individual sovereignty while enabling institutional governance.</t>
      
      
      <t>## Expiration Semantics</t>
      
      
      <t>Subordinate identities SHOULD include explicit expiration semantics. Expired subordinate
identities MUST be treated as invalid even if cryptographic signatures remain valid.</t>
      
      
      <t>Relying parties MUST verify validity intervals during resolution.</t>
      
      
      <t># Capability Assignment</t>
      
      
      <t>Capabilities define the actions a subordinate identity is authorized to perform within a
given context. Capabilities provide fine-grained authorization semantics that are evaluated
by relying parties independently of identity resolution.</t>
      
      
      <t>INSA does not define a universal capability language. Instead, it defines the cryptographic
binding and verification model required to associate capabilities with subordinate
identities in a verifiable manner.</t>
      
      
      <t>## Capability Semantics</t>
      
      
      <t>A capability represents permission to perform a specific class of actions under defined
conditions. Capability semantics are interpreted by relying systems according to local
policy and application requirements.</t>
      
      
      <t>Capabilities MAY encode scope, constraints, limits, or contextual parameters. INSA does not
impose semantic meaning beyond the requirement that capabilities be cryptographically
verifiable.</t>
      
      
      <t>## Binding Capabilities to Subordinate Identities</t>
      
      
      <t>Capabilities MUST be bound to subordinate identities through subordinate manifests.
A subordinate manifest MAY bind one or more capabilities.</t>
      
      
      <t>Capability bindings MUST be covered by the signatures of both the canonical identity holder
and the issuing role authority.</t>
      
      
      <t>## Capability Evaluation</t>
      
      
      <t>Relying parties evaluate capabilities when making authorization decisions. Evaluation
includes verification of:</t>
      
      
      <t>* the subordinate manifest signatures
* the validity interval of the subordinate identity
* the integrity of bound capabilities
* any application-specific constraints</t>
      
      
      <t>INSA does not require relying parties to contact issuing authorities during capability
evaluation.</t>
      
    
    </section>
    
    
    <section title="Document Pressure">
      
      
      <t>## Revocation and Update of Capabilities</t>
      
      
      <t>Capabilities MAY be revoked or modified by issuing a new subordinate manifest. Revocation
of a subordinate identity implicitly revokes all associated capabilities.</t>
      
      
      <t>Relying parties MUST treat revoked or expired subordinate identities as having no valid
capabilities.</t>
      
      
      <t>## Least Privilege</t>
      
      
      <t>Issuing role authorities SHOULD apply the principle of least privilege when assigning
capabilities. Capabilities SHOULD grant only the minimum permissions necessary to perform
the intended role.</t>
      
      
      <t>## Independence from Authentication Protocols</t>
      
      
      <t>Capability evaluation is independent of authentication protocols, session management, or
transport mechanisms. INSA defines only the authorization data model, not how capabilities
are exercised within applications.</t>
      
      
      <t>## Capability Portability</t>
      
      
      <t>Capabilities MAY be evaluated across different systems and applications provided that the
capability semantics are understood by the relying party. INSA does not restrict capability
interpretation to a single platform or vendor.</t>
      
      
      <t># IDNS Resolution</t>
      
      
      <t>IDNS resolution is the process by which a relying party retrieves and verifies identity
information using cryptographic proofs rather than trusted online services. Resolution is
designed to be stateless, deterministic, and verifiable using data obtained from untrusted
sources.</t>
      
      
      <t>Resolution does not require prior trust relationships between the resolver and sovereign
operators, role authorities, or distribution infrastructure.</t>
      
      
      <t>## Resolution Inputs</t>
      
      
      <t>An IDNS resolution operation takes the following inputs:</t>
      
      
      <t>* an identity reference, such as a canonical or subordinate identifier
* a namespace suffix identifying the sovereign identity namespace
* locally configured trust policy defining acceptable sovereign operators</t>
      
      
      <t>Resolvers MAY accept additional policy inputs defined by the relying party.</t>
      
      
      <t>## Resolution Outputs</t>
      
      
      <t>Successful resolution produces a verified identity result that includes:</t>
      
      
      <t>* the resolved canonical manifest
* zero or more resolved subordinate manifests
* verified Merkle inclusion proofs
* verified signed Merkle root metadata
* validation status and error indicators</t>
      
      
      <t>Resolvers MUST distinguish between verification failure and absence of identity data.</t>
      
      
      <t>## Canonical Identity Resolution</t>
      
      
      <t>To resolve a canonical identity, a resolver performs the following steps:</t>
      
      
      <t>1. Retrieve the canonical manifest from any available source.
2. Retrieve the corresponding Merkle inclusion proof.
3. Retrieve the signed Merkle root for the relevant sovereign identity tree.
4. Verify the signature on the Merkle root.
5. Verify the inclusion proof against the Merkle root.
6. Verify the signature on the canonical manifest.
7. Apply local trust policy to the sovereign operator signature.</t>
      
      
      <t>Failure at any step MUST result in resolution failure.</t>
      
      
      <t>## Subordinate Identity Resolution</t>
      
      
      <t>To resolve a subordinate identity, a resolver performs the following steps:</t>
      
      
      <t>1. Resolve the associated canonical identity.
2. Retrieve the subordinate manifest.
3. Verify the subordinate manifest signatures.
4. Verify validity intervals and revocation status.
5. Verify capability bindings.</t>
      
      
      <t>Resolvers MUST verify that subordinate manifests reference a valid canonical identity.</t>
      
      
      <t>## Stateless Verification</t>
      
      
      <t>Resolvers MUST NOT rely on synchronized databases or real-time connections to sovereign
operators or role authorities. All retrieved data MAY be cached, mirrored, or relayed
through untrusted intermediaries.</t>
      
      
      <t>Stateless verification ensures that resolution remains robust under network partition,
operator outage, or adversarial distribution conditions.</t>
      
      
      <t>## Caching Semantics</t>
      
      
      <t>Resolvers MAY cache verified manifests, Merkle roots, and inclusion proofs to improve
performance. Cached data MUST be revalidated according to local policy and expiration
constraints.</t>
      
      
      <t>Caching MUST NOT override verification requirements.</t>
      
      
      <t>## Failure Modes</t>
      
      
      <t>Resolvers MUST provide explicit failure indicators for the following conditions:</t>
      
      
      <t>* invalid signatures
* invalid Merkle proofs
* expired or revoked identities
* unsupported namespace suffixes
* policy rejection by the relying party</t>
      
      
      <t>Resolvers SHOULD avoid ambiguous failure states.</t>
      
      
      <t>## Multiple Namespace Support</t>
      
      
      <t>Resolvers MAY support multiple sovereign namespaces concurrently. Resolution within one
namespace MUST NOT imply trust in any other namespace.</t>
      
    
    </section>
    
    
    <section title="Institutional Pressure">
      
      
      <t>Trust decisions across namespaces are governed solely by local policy.</t>
      
      
      <t>## Offline Resolution</t>
      
      
      <t>Resolvers MAY perform resolution using previously obtained data when network access is
unavailable. Offline resolution MUST apply the same verification rules as online
resolution and MUST respect validity intervals and revocation information.</t>
      
      
      <t># Merkle Tree Construction and Update Semantics</t>
      
      
      <t>INSA uses Merkle trees as cryptographic commitment structures for publishing canonical
identity manifests. Merkle trees provide efficient inclusion proofs, tamper evidence, and
stateless verification without requiring global consensus or synchronized replicas.</t>
      
      
      <t>This section defines the construction, ordering, hashing, and update semantics required
for interoperable Merkle tree implementations within INSA.</t>
      
      
      <t>## Hash Function Requirements</t>
      
      
      <t>Merkle trees used in INSA MUST employ a cryptographic hash function that provides
preimage resistance, second-preimage resistance, and collision resistance.</t>
      
      
      <t>The selected hash function MUST be specified by the sovereign operator and published as
part of namespace metadata. Hash function agility SHOULD be supported to accommodate
cryptographic evolution.</t>
      
      
      <t>## Leaf Encoding</t>
      
      
      <t>Each leaf node in a sovereign identity tree represents a canonical identity manifest.</t>
      
      
      <t>Leaf nodes MUST be constructed by hashing a canonical, byte-for-byte serialization of the
canonical manifest. The serialization format MUST be deterministic and unambiguous.</t>
      
      
      <t>Implementations MUST NOT include transport-specific or presentation-specific data in leaf
encodings.</t>
      
      
      <t>## Canonical Ordering</t>
      
      
      <t>Canonical identity manifests MUST be ordered deterministically prior to Merkle tree
construction. Ordering MAY be based on manifest identifiers, canonical public keys, or
other deterministic attributes defined by the sovereign operator.</t>
      
      
      <t>The ordering rule MUST be published and stable across tree updates.</t>
      
      
      <t>## Tree Construction</t>
      
      
      <t>Merkle trees MAY use binary or higher-arity branching. The branching factor MUST be
consistent within a given sovereign identity tree and documented in namespace metadata.</t>
      
      
      <t>Interior nodes MUST be constructed by hashing the concatenation of their child node
hashes. The concatenation order MUST follow the canonical ordering of child nodes.</t>
      
      
      <t>## Merkle Root Commitment</t>
      
      
      <t>The Merkle root represents a cryptographic commitment to the complete set of canonical
identity manifests at a specific point in time.</t>
      
      
      <t>Sovereign operators MUST sign each Merkle root using an operator signing key. The signed
Merkle root MUST be published along with sufficient metadata to allow independent
verification.</t>
      
      
      <t>## Inclusion Proofs</t>
      
      
      <t>An inclusion proof consists of the minimal set of sibling hashes required to reconstruct
the Merkle root from a given leaf.</t>
      
      
      <t>Inclusion proofs MUST be verifiable without access to the full tree and MUST be valid only
for the specific Merkle root to which they correspond.</t>
      
      
      <t>Resolvers MUST reject inclusion proofs that do not validate against the signed Merkle
root.</t>
      
      
      <t>## Tree Updates</t>
      
      
      <t>Updates to a sovereign identity tree occur when canonical identity manifests are added,
updated, or revoked.</t>
      
      
      <t>Each update produces a new Merkle root. Previous roots MUST remain verifiable and MUST NOT
be retroactively modified.</t>
      
      
      <t>Sovereign operators SHOULD retain historical Merkle roots to support auditability and
long-term verification.</t>
      
      
      <t>## Key Rotation and Tree Updates</t>
      
      
      <t>Canonical identity key rotation results in issuance of a new canonical manifest and a
corresponding tree update. The new manifest MUST reference prior lineage information to
preserve identity continuity.</t>
      
      
      <t>Tree updates resulting from key rotation MUST preserve the validity of historical roots.</t>
      
      
      <t>## Transparency Compatibility</t>
      
      
      <t>Merkle trees used in INSA are compatible with transparency log architectures. Sovereign
operators MAY publish Merkle roots to external transparency systems to enhance auditability.</t>
      
      
      <t>INSA does not require global transparency logs or blockchain-based consensus.</t>
      
      
      <t>## Error Handling</t>
      
      
      <t>Resolvers MUST detect and reject malformed trees, invalid node hashes, or inconsistent
ordering rules. Failure to validate Merkle semantics MUST result in resolution failure.</t>
      
      
      <t>## Security Considerations for Merkle Trees</t>
      
      
      <t>Merkle tree integrity depends on correct ordering, deterministic encoding, and secure hash
functions. Sovereign operators MUST ensure that tree construction rules are clearly
specified and consistently applied.</t>
      
    
    </section>
    
    
    <section title="Temporal Pressure">
      
      
      <t>Ambiguity in leaf encoding or ordering MAY enable substitution or equivocation attacks and
MUST be avoided.</t>
      
      
      <t># Security Considerations</t>
      
      
      <t>INSA is designed to minimize implicit trust and reduce reliance on centralized services.
Security is achieved through cryptographic verification, explicit governance boundaries,
and deterministic resolution semantics. This section analyzes relevant threat models and
defines required mitigations.</t>
      
      
      <t>No trust relationship is implied by co residency, shared infrastructure, deployment environment, organizational ownership, or administrative domain.</t>
      
      
      <t>## Threat Model</t>
      
      
      <t>INSA assumes an adversarial environment in which network infrastructure, storage systems,
and data distribution channels may be compromised or malicious. Adversaries MAY control
distribution endpoints, attempt data substitution, replay stale information, or induce
confusion across namespaces.</t>
      
      
      <t>INSA does not assume compromise of cryptographic primitives or secure key generation
processes.</t>
      
      
      <t>## Substitution Attacks</t>
      
      
      <t>An attacker may attempt to substitute identity manifests, Merkle roots, or inclusion
proofs.</t>
      
      
      <t>Resolvers MUST verify signatures on Merkle roots and manifests and MUST validate inclusion
proofs against the signed Merkle root. Failure to validate any cryptographic element MUST
result in resolution failure.</t>
      
      
      <t>Substitution attacks are mitigated by cryptographic binding of manifests to Merkle roots
and sovereign operator signatures.</t>
      
      
      <t>## Replay Attacks</t>
      
      
      <t>An attacker may attempt to replay outdated but previously valid identity data.</t>
      
      
      <t>Resolvers MUST verify validity intervals, revocation status, and lineage metadata.
Resolvers SHOULD apply local policy to determine acceptable staleness of Merkle roots.</t>
      
      
      <t>Sovereign operators SHOULD publish root metadata frequently enough to limit replay windows.</t>
      
      
      <t>## Rogue Sovereign Operators</t>
      
      
      <t>A sovereign operator may behave maliciously or negligently within its namespace.</t>
      
      
      <t>INSA does not attempt to prevent malicious sovereign behavior. Instead, it enables relying
parties to apply explicit trust policy when selecting acceptable namespaces.</t>
      
      
      <t>Relying parties MUST NOT assume correctness or benevolence of sovereign operators outside
their configured trust policy.</t>
      
      
      <t>## Compromised Role Authorities</t>
      
      
      <t>Role authorities may issue unauthorized subordinate identities or capabilities.</t>
      
      
      <t>Dual attestation mitigates this risk by requiring canonical identity holder signatures.
Relying parties SHOULD verify both attestations and apply institutional trust policy when
evaluating subordinate identities.</t>
      
      
      <t>## Canonical Key Compromise</t>
      
      
      <t>Compromise of a canonical private key enables impersonation of the associated identity.</t>
      
      
      <t>Canonical key holders MUST protect private keys using appropriate safeguards. Key rotation
mechanisms enable recovery from compromise but cannot prevent misuse prior to detection.</t>
      
      
      <t>Loss of canonical key control represents a severe security event.</t>
      
      
      <t>## Subordinate Key Compromise</t>
      
      
      <t>Compromise of subordinate identity keys enables misuse of institutional roles.</t>
      
      
      <t>Institutions SHOULD limit subordinate identity validity periods and apply least-privilege
capability assignment. Revocation mechanisms MUST be discoverable during resolution.</t>
      
      
      <t>## Namespace Confusion Attacks</t>
      
      
      <t>An attacker may attempt to exploit human-readable name ambiguity or namespace similarity.</t>
      
      
      <t>Relying parties MUST treat namespace suffixes and cryptographic identifiers as authoritative
and MUST NOT rely on human-readable labels for security decisions.</t>
      
      
      <t>## Downgrade Attacks</t>
      
      
      <t>Attackers may attempt to induce resolvers to accept weaker cryptographic parameters.</t>
      
      
      <t>Resolvers MUST enforce minimum cryptographic requirements and reject unsupported or
deprecated algorithms according to local policy.</t>
      
      
      <t>## Denial of Service Considerations</t>
      
      
      <t>INSA does not require interactive services during resolution, reducing exposure to
denial-of-service attacks. However, large inclusion proofs or excessive resolution requests
may impact resolver performance.</t>
      
      
      <t>Resolvers SHOULD implement reasonable resource limits and caching strategies.</t>
      
      
      <t>## Auditability and Accountability</t>
      
      
      <t>Retention of historical Merkle roots and manifests enables post-event audit and forensic
analysis. Sovereign operators SHOULD provide sufficient data to support independent audits.</t>
      
    
    </section>
    
    
    <section title="Systemic Pressure">
      
      
      <t>## Security Summary</t>
      
      
      <t>INSA's security model relies on explicit trust selection, cryptographic verification, and
stateless resolution. Relying parties bear responsibility for trust policy configuration
and enforcement.</t>
      
      
      <t># Privacy Considerations</t>
      
      
      <t>INSA is designed to support verifiable identity while minimizing unnecessary disclosure and
correlation. Privacy protection is achieved primarily through architectural separation,
selective disclosure, and reliance on cryptographic verification rather than centralized
query services.</t>
      
      
      <t>## Separation of Identity Contexts</t>
      
      
      <t>INSA distinguishes between canonical identities and subordinate identities to reduce
cross-context correlation. Canonical identities represent long-lived personhood, while
subordinate identities represent scoped, institution-specific roles.</t>
      
      
      <t>Relying parties SHOULD prefer subordinate identities when interacting in institutional or
role-based contexts. Use of canonical identities SHOULD be limited to cases where long-term
personhood is explicitly required.</t>
      
      
      <t>## Minimal Disclosure</t>
      
      
      <t>Canonical and subordinate manifests MAY include optional descriptive attributes. Such
attributes SHOULD be minimized and limited to information strictly necessary for the
intended purpose.</t>
      
      
      <t>Relying parties MUST NOT assume the presence of descriptive attributes and MUST NOT require
attributes beyond those necessary for verification and authorization.</t>
      
      
      <t>## Correlation Risks</t>
      
      
      <t>Repeated resolution of the same canonical identity across unrelated contexts may enable
correlation by observers of resolution activity.</t>
      
      
      <t>INSA mitigates this risk by enabling stateless resolution and allowing manifests, Merkle
roots, and inclusion proofs to be retrieved from untrusted or offline sources. Resolvers
MAY cache identity data to reduce observable network activity.</t>
      
      
      <t>## Namespace-Level Observability</t>
      
      
      <t>Sovereign operators may observe publication events within their namespace but do not
participate in identity resolution. Resolution does not require contacting the sovereign
operator in real time.</t>
      
      
      <t>This design limits operator visibility into relying party behavior and identity usage
patterns.</t>
      
      
      <t>## Offline and Delegated Resolution</t>
      
      
      <t>Resolvers MAY perform resolution using locally cached data or delegated resolution
services. Delegated resolvers MUST NOT be trusted implicitly and SHOULD be treated as
untrusted distribution points.</t>
      
      
      <t>All verification MUST occur locally at the relying party.</t>
      
      
      <t>## Attribute Evolution</t>
      
      
      <t>Descriptive attributes associated with identities may change over time. Attribute updates
MUST NOT invalidate identity continuity and SHOULD be treated as non-authoritative metadata.</t>
      
      
      <t>## Relationship to Companion Specifications</t>
      
      
      <t>Endpoint discovery, messaging, and communication profiles introduce additional privacy
considerations beyond the scope of this document. Such considerations are addressed in
companion specifications and MUST NOT alter the privacy guarantees described herein.</t>
      
      
      <t>## Privacy Summary</t>
      
      
      <t>INSA provides structural privacy protections through separation of concerns, stateless
verification, and minimization of required disclosure. Privacy outcomes ultimately depend
on relying party policy and implementation choices.</t>
      
      
      <t># IANA Considerations</t>
      
      
      <t>This document defines architectural elements that require coordinated registration to
ensure interoperability across independent implementations. This section specifies the
IANA registries required by INSA and the policies governing their maintenance.</t>
      
      
      <t>## URI Scheme Registration</t>
      
      
      <t>This document requests registration of the `id` URI scheme in the IANA URI Schemes
registry in accordance with &lt;&lt;rfc3986&gt;&gt;.</t>
      
      
      <t>### Scheme Name</t>
      
      
      <t>`id`</t>
      
      
      <t>### Status</t>
      
      
      <t>Permanent</t>
      
      
      <t>### Scheme Syntax</t>
      
      
      <t>The general syntax of an `id` URI is:</t>
      
      
      <t>id://`&lt;identifier&gt;`</t>
      
      
      <t>The `&lt;identifier&gt;` component is interpreted according to INSA resolution rules and MAY
include namespace suffixes, canonical identifiers, or subordinate identifiers.</t>
      
      
      <t>### Scheme Semantics</t>
      
      
      <t>The `id` URI scheme identifies an INSA identity reference. It does not imply transport,
location, or communication semantics. Resolution of an `id` URI yields identity data and
verification artifacts, not network endpoints.</t>
      
      
      <t>### Encoding Considerations</t>
      
    
    </section>
    
    
    <section title="Architectural Implications">
      
      
      <t>The `id` URI scheme conforms to the encoding requirements defined in &lt;&lt;rfc3986&gt;&gt;.</t>
      
      
      <t>### Security Considerations</t>
      
      
      <t>Security considerations for the `id` URI scheme are described throughout this document,
including Sections on resolution, Merkle verification, and trust policy.</t>
      
      
      <t>---</t>
      
      
      <t>## Sovereign Namespace Suffix Registry</t>
      
      
      <t>This document requests the creation of an IANA registry for Sovereign Identity Namespace
Suffixes.</t>
      
      
      <t>### Registry Purpose</t>
      
      
      <t>The registry records namespace suffixes corresponding to sovereign identity namespaces.
Each entry represents a trust boundary operated by a sovereign operator.</t>
      
      
      <t>### Registry Contents</t>
      
      
      <t>Each registry entry MUST include:</t>
      
      
      <t>* Namespace suffix (for example, `ca.id`)
* Sovereign operator name
* Reference to operator policy documentation
* Cryptographic metadata endpoint or reference
* Contact information for operational issues</t>
      
      
      <t>### Registration Policy</t>
      
      
      <t>Registration of namespace suffixes MUST follow a policy of **Expert Review** as defined in
&lt;&lt;rfc8126&gt;&gt;.</t>
      
      
      <t>Expert review ensures that suffixes are unique, well-formed, and associated with a clearly
identified sovereign operator.</t>
      
      
      <t>### Update and Revocation</t>
      
      
      <t>Registry entries MAY be updated to reflect changes in operator metadata. Revocation or
deprecation of a namespace suffix MUST be clearly indicated and MUST NOT invalidate
previously issued canonical identities unless explicitly stated by sovereign policy.</t>
      
      
      <t>---</t>
      
      
      <t>## Extension Registries</t>
      
      
      <t>Future specifications MAY define additional IANA registries related to INSA, including but
not limited to:</t>
      
      
      <t>* identity manifest schema identifiers
* capability schema identifiers
* resolution metadata formats</t>
      
      
      <t>Such registries MUST be defined in companion specifications and MUST NOT modify the core
registries defined in this document.</t>
      
      
      <t>---</t>
      
      
      <t>## No Global Root Registry</t>
      
      
      <t>INSA explicitly does not require a global root authority or hierarchical registry beyond
the namespace suffix registry defined above. The absence of a global root registry is a
deliberate design choice intended to preserve decentralization and sovereign autonomy.</t>
      
      
      <t>---</t>
      
      
      <t>## IANA Summary</t>
      
      
      <t>The IANA actions requested by this document are limited in scope and designed to support
interoperability without introducing centralized control over identity issuance or
resolution.</t>
      
      
      <t># Summary</t>
      
      
      <t>The Identity Namespace System Architecture defines a durable, verifiable, and sovereign
identity substrate grounded in cryptographic proofs rather than centralized services.
By separating canonical human identities from institutionally governed subordinate roles,
INSA enables accountability without compromising individual sovereignty.</t>
      
      
      <t>INSA's use of signed manifests, Merkle-rooted registries, and stateless resolution allows
relying parties to independently verify identity information obtained from untrusted
sources. Explicit trust boundaries defined by sovereign namespaces replace implicit global
trust assumptions, enabling decentralized governance and jurisdictional diversity.</t>
      
      
      <t>This document intentionally limits its scope to identity representation, publication, and
resolution. Endpoint discovery, messaging, and communication semantics are addressed in
separate companion specifications to preserve architectural clarity and long-term
stability.</t>
      
      
      <t>Together, these design principles position INSA as a foundational identity layer suitable
for civil, commercial, and personal use in a globally distributed environment.</t>
      
      
      <t># References</t>
      
      
      <t>## Normative References</t>
      
      
      <t>&lt;&lt;rfc2119&gt;&gt; Bradner, S., &quot;Key words for use in RFCs to Indicate Requirement Levels&quot;,
BCP 14, RFC 2119, March 1997.</t>
      
      
      <t>&lt;&lt;rfc8174&gt;&gt; Leiba, B., &quot;Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words&quot;,
BCP 14, RFC 8174, May 2017.</t>
      
      
      <t>&lt;&lt;rfc3986&gt;&gt; Berners-Lee, T., Fielding, R., and L. Masinter,
&quot;Uniform Resource Identifier (URI): Generic Syntax&quot;,
STD 66, RFC 3986, January 2005.</t>
      
      
      <t>&lt;&lt;rfc8259&gt;&gt; Bray, T., &quot;The JavaScript Object Notation (JSON) Data Interchange Format&quot;,
STD 90, RFC 8259, December 2017.</t>
      
      
      <t>## Informative References</t>
      
      
      <t>&lt;&lt;rfc6962&gt;&gt; Laurie, B., Langley, A., and E. Kasper,
&quot;Certificate Transparency&quot;,
RFC 6962, June 2013.</t>
      
      
      <t>&lt;&lt;rfc8446&gt;&gt; Rescorla, E.,
&quot;The Transport Layer Security (TLS) Protocol Version 1.3&quot;,
RFC 8446, August 2018.</t>
      
      
      <t>&lt;&lt;merkle1987&gt;&gt; Merkle, R. C.,
&quot;A Digital Signature Based on a Conventional Encryption Function&quot;,
Advances in Cryptology CRYPTO 87,
Lecture Notes in Computer Science, vol. 293, 1987.</t>
      
      
      <t>&lt;&lt;fips180-4&gt;&gt; National Institute of Standards and Technology,
&quot;Secure Hash Standard&quot;,
FIPS PUB 180-4, August 2015.</t>
      
      
      <t>&lt;&lt;fips186-5&gt;&gt; National Institute of Standards and Technology,
&quot;Digital Signature Standard (DSS)&quot;,
FIPS PUB 186-5, 2023.</t>
      
      
      <t>&lt;&lt;nist-pqc&gt;&gt; National Institute of Standards and Technology,
&quot;Post-Quantum Cryptography Standardization Project&quot;,
https://csrc.nist.gov/projects/post-quantum-cryptography.</t>
      
      
      <t>&lt;&lt;idns-messaging&gt;&gt; REDACTED,
&quot;Identity Endpoint Discovery and Communication Profiles&quot;,
Work in Progress (companion document).</t>
      
    
    </section>
    
  
  </middle>
  
  
 

</rfc>
