Skip to Content
Introduction

Welcome

Decentralized identity is hard, especially when using powerful protocols like KERI and ACDC! So, we’d like to make that a bit easier for you, and help you secure your applications the right way.

For now, these developer docs focus on helping you integrate these protocols into your applications, whether they are cloud services, IoT edge devices or something else. The mobile wallet we’ve built, along with other tools and products we plan to release in the near future, is intended to address many of the complex challenges developers face when working with decentralized identity. However, it’s up to you to integrate these technologies into your business logic and tailor them to your specific use cases.

These docs will be ever growing — we intend to include more visual examples, and more complete code snippets over time.

Last updated on