Introduction
Introduction to the Verification Protocol in MCP-I
Verification Foundation
The Verification Protocol is a critical security component of MCP-I, defining standardized processes to cryptographically validate agent identity and delegation authority.
Introduction to Verification
Verification in MCP-I ensures that agents possess valid delegation credentials before they can access resources or perform actions. The Verification Protocol defines:
- How verifiers authenticate agent identities
- How delegation credentials are validated
- The handshake process between agents and services
- Fallback mechanisms for different MCP-I conformance levels
Verification Components
Key Actors
- Agent: The entity presenting credentials and requesting access
- Verifier: The component validating credentials (Edge Proxy or Service)
- Principal: The original delegator (not directly involved in verification)
- DID Resolver: Infrastructure for resolving DID documents
- Revocation Service: Infrastructure for checking credential revocation status
Core Verification Operations
- DID Resolution: Converting DIDs to DID Documents with verification keys
- Signature Verification: Validating cryptographic signatures
- Revocation Checking: Confirming credentials are still valid
- Scope Matching: Ensuring requested actions are authorized
- Constraint Validation: Checking that any delegation constraints are satisfied