Skip to content

Latest commit

 

History

History
36 lines (23 loc) · 1.86 KB

README.md

File metadata and controls

36 lines (23 loc) · 1.86 KB

DIDKit HTTP

Implementation of the Verifiable Credentials API using DIDKit.

Usage

The Docker image is available at https://github.com/spruceid/didkit/pkgs/container/didkit-http.

Configuration

Refer to the defaults configuration file.

To provide overrides you can either:

  • use a configuration file named didkit-http.toml which follows the structure as the defaults files; or
  • use environment variables, which are prefixed with DIDKIT_HTTP_ and follow the same names, with a separating _ between sections.

Security Considerations

Spruce does not use DIDKit HTTP in any production environments except with a reverse proxy, and does not recommend them for production use-cases without a holistic review of security levels. The following is not an exhaustive list, but should be considered in any such review.

Authorization

DIDKit HTTP does not implement any endpoint authorization or access control. Any client can request a signature/proof creation from the server's key(s) using the issue credential/presentation endpoints. To limit access to some or all of DIDKit HTTP's endpoints, a deployment should place DIDKit HTTP behind a reverse proxy with appropriate settings.

Denial of Service

DIDKit HTTP does not implement complete protection against resource exhaustion. Clients may be able to overwhelm the server with excessively slow and/or concurrent requests. To protect against resource exhaustion, deployments should use a reverse proxy with rate limiting, load balancing across multiple DIDKit HTTP instances, and/or other protections.