Implementation of the Verifiable Credentials API using DIDKit.
The Docker image is available at https://github.com/spruceid/didkit/pkgs/container/didkit-http.
Refer to the defaults configuration file.
To provide overrides you can either:
- use a configuration file named
didkit-http.toml
which follows the structure as the defaults files; or - use environment variables, which are prefixed with
DIDKIT_HTTP_
and follow the same names, with a separating_
between sections.
Spruce does not use DIDKit HTTP in any production environments except with a reverse proxy, and does not recommend them for production use-cases without a holistic review of security levels. The following is not an exhaustive list, but should be considered in any such review.
DIDKit HTTP does not implement any endpoint authorization or access control. Any client can request a signature/proof creation from the server's key(s) using the issue credential/presentation endpoints. To limit access to some or all of DIDKit HTTP's endpoints, a deployment should place DIDKit HTTP behind a reverse proxy with appropriate settings.
DIDKit HTTP does not implement complete protection against resource exhaustion. Clients may be able to overwhelm the server with excessively slow and/or concurrent requests. To protect against resource exhaustion, deployments should use a reverse proxy with rate limiting, load balancing across multiple DIDKit HTTP instances, and/or other protections.