Identity Attestation Methods and Mapping in DIA¶
Document Status¶
| Field | Value |
|---|---|
policy-id |
DIA-ATTEST-PROVIDERS-001 |
type |
Implementing act / attestation-method registry |
version |
0.2.0-draft |
date |
2026-03-31 |
changes |
Added software-pinned source class with strength sovereign and max IAL5; clarified that sovereign is not an attestation-chain method. |
1. Purpose¶
This document maps identity-attestation methods to:
- attestation-strength class (
weak/strong), - maximum
IAL, - operational limits,
- requirements for upgrade and refresh.
It does not create a new kind of root-identity. It defines only the quality of
attestation of the identity source.
2. General Rules¶
-
weak,strong, andsovereignare properties of the assurance source, not of personhood. -
The same
anchor-identitymay have many attestations of different strength over time. -
A
weak -> strongupgrade SHOULD preserveanchor-identity,node-id, andpersistent_nymif proof of continuity of control exists. -
The maximum
IALof a method is the default ceiling; a federation may lower it, but should not raise it without an explicit validation procedure.
3. Default Mapping¶
source_class |
Example | Strength | Default max IAL |
Notes |
|---|---|---|---|---|
phone |
phone number with OTP confirmation | weak |
IAL1 |
IAL2 only through an explicit opt-in federation policy and added safeguards |
multisig-basic |
k-of-n vouching without deeper attester audit |
weak |
IAL2 |
fallback for jurisdictions without strong eID |
multisig-audited |
k-of-n vouching with audit, diversity, and attester accountability |
strong |
IAL3 |
does not unlock IAL4 without a separate unsealing track |
eid |
state or supranational eID | strong |
IAL3 |
to IAL4 only when paired with an unsealing track |
mobywatel |
official QR / state app channel | strong |
IAL3 |
locally jurisdiction-dependent |
epuap |
trusted profile / official channel | strong |
IAL3 |
depends on integration quality |
qualified_signature |
qualified signature | strong |
IAL4 |
preferred for high-stakes roles |
registry |
formal registry data of an organization | strong |
IAL3 |
to IAL4 after meeting procedural requirements |
software-pinned |
public key compiled into a signed software release or pinned in a signed deployment configuration distributed with the release | sovereign |
IAL5 |
not an attestation method; confers governance-level trust anchor designation; assignment through software release governance, not through identity proofing; orthogonal to IAL0–IAL4 |
other |
local / experimental method | depends on validation | IAL0-IAL2 |
requires explicit federation documentation |
Note on sovereign strength class. sovereign is not a stronger form of
strong attestation. It is categorically different: the trust derives from
explicit key pinning in the software distribution and its release governance
process, not from any verification of the key holder's real-world identity. A
sovereign-class source does not satisfy identity-proofing requirements for
roles that specify IAL1–IAL4. It applies only where a role or policy
explicitly names IAL5 or sovereign trust anchor status.
4. Special Rules for Phone Numbers¶
-
A verified phone number is convenient for entry, but SHOULD NOT by itself unlock high-stakes roles.
-
For
source_class = phone, a federation SHOULD at minimum restrict: -
governance roles,
- panel roles,
- high-stakes oracle roles,
-
operations requiring
U2orU3. -
A federation MAY allow
phone -> IAL2only through an explicit opt-in policy and only when there are additionally: -
a longer reputational maturation period,
- takeover-anomaly detection,
- influence-multiplication limits,
-
the ability to downgrade quickly after a compromise signal.
-
A
phone -> strongupgrade SHOULD pass through a waiting period (phone_upgrade_cooldown) and anomaly checks consistent withIDENTITY-UPGRADE-ANOMALY-SIGNALS.md.
Default safe profile:
-
phone_upgrade_cooldown = 14 days, -
no active recovery in the short window preceding the upgrade,
-
no abrupt rotation of stations, nyms, or node keys,
-
no active identity dispute, takeover signal, or open incident,
-
no fresh phone-number or attestation-source change without additional review.
5. Upgrade Rules¶
-
A
weak -> strongupgrade requires, at the same time: -
control over the existing anchor,
- a new
strongattestation, -
no hard identity dispute.
-
After the upgrade:
-
anchor-identityremains the same, node-idmay remain the same,- ephemeral nyms and station certificates may be refreshed,
-
the prior attestation remains in the audit chain as
supersededorexpired. -
If the upgrade starts from
source_class = phone, a federation SHOULD at minimum trigger: -
age check of the phone attestation,
- device and station churn check,
- geographic or network anomaly check when such signals are available,
- review of recent recovery attempts, key resets, and revocations,
- manual review for roles that would enter
IAL3+after the upgrade.
6. Relations to Other Documents¶
ROOT-IDENTITY-AND-NYMS.mddefines identity layers andIALlevels.IDENTITY-ATTESTATION-AND-RECOVERY.mddefines attestation memory and upgrade.ROLE-TO-IAL-MATRIX.mddefines which roles can be unlocked at a givenIAL.IDENTITY-UPGRADE-ANOMALY-SIGNALS.mddefines the minimum catalog of signals, responses, and review for attestation upgrade.