Lesson #86 - SDI Use Cases
Kris Durski
We are so grateful for your loyalty and support. You are the reason we do what we do. Thank you for being part of our amazing community. You rock! đđ¤
Introduction
SDI (Secure Digital Identity) is a cryptographic proxy to the userâs true identity. It is conformant to the ZKP (Zero Knowledge Proof) standard:
Completeness: if the statement is true, a verifier will be convinced of this fact because only the private key that is a counterpart of a public key can decrypt the nonce
Soundness: if the statement is false, a prover cannot convince otherwise because the inability to decrypt the nonce means lack of possession of the corresponding private key, i.e. wrong identity
Zero-knowledge: if the statement is true, a verifier cannot learn anything else but the fact that the statement is true because the public key or decryption of a nonce does not convey any information about the private parameters
With SDI the proof reaches 100% certainty after only one cycle. The SDI security supports the ZTA (Zero Trust Architecture) model without external account management. The provider may use either a single SDI service so all authorizations will be done with the same pair of asymmetric keys and the ephemeral nonce (one-time use) or multiple SDI services where each will require a different pair of keys and the ephemeral nonce. A nonce is ephemeral because it is not stored anywhere in the open form even on the SDI server.
SDI Initiated Login
The user starts the SDI app if not running yet and connects to the authentication service to bring their PCM (Personal Cryptographic Matter) container or logs in to the cached PCM. Once the SDI app is authorized, the user selects the company and starts the managing app to initiate communication.
The managing app formulates a directive to start browsing and sends that directive via the SDI app which attaches the SDI data and sends it to the SDI server.
The SDI server verifies the SDI data and if not correct, it aborts communication.
If correct, the SDI server forwards the directive to the content server.
The content server finds the user in its database and sends the push notification to the chosen device.
The push notification shall contain the URL and data needed to recognize the user, e.g. token.
The user responds to that notification, e.g. by clicking it, which shall launch the browser for a given URL.
The browser sends a request for the userâs topics page.
The content server finds the user, creates the userâs topics page, and sends it back to the user.
The userâs browser receives the page and the user can start working.
Browser Initiated Login
The user starts the SDI app if not running yet and connects to the authentication service to bring their PCM (Personal Cryptographic Matter) container or logs in to the cached PCM. The user opens a browser, navigates to the desired URL, and clicks a link that requires authorization.
The browser sends a request for the topics page to the content server.
The content server sends a login page with the attached topic.
The login page shall contain information about the unknown userâs request.
The user types their login name and leaves the password field blank if provided.
The login form with the userâs login name shall be associated with the original request.
The server finds the userâs record based on the login name and sends a push notification to the userâs chosen device that runs the SDI app.
The push notification shall contain the URL of the service and the requested topic.
The userâs SDI app finds the provider based on a given URL and asks the user for confirmation. The user either approves or denies.
The userâs decision, SDI data, and the requested topic are sent to the SDI server.
The SDI server verifies the SDI data and if incorrect, it aborts communication.
If correct, the SDI server forwards the directive to the content server.
If the directive approves the request, the content server sends the requested page to the userâs browser. Otherwise, the content server denies access.
The content arrives at the userâs browser and the user can start working.
Continue to the Next Topic
The user finishes working with a given topic and moves on to the next by clicking the desired link.
The userâs browser sends a request for the next topic, which also requires authorization.
The content server finds the userâs record in its database and sends the push notification to the chosen device.
The push notification shall contain the URL of the service and the requested topic.
The userâs SDI app locates the provider based on a given URL and sends the notification to the managing app, which asks the user for confirmation or does auto-confirmation if configured so.
The userâs decision, SDI data, and the requested topic are sent to the SDI server.
The SDI server verifies the SDI data and if incorrect, it aborts communication.
If correct, the SDI server forwards the directive to the content server.
If the directive approves the request, the content server sends the requested page to the userâs browser. Otherwise, the content server denies access.
The content arrives at the userâs browser and the user can continue working.
Thank you for reading our newsletter and stay tuned for more updates from Vault Security!
Itâs been a pleasure to share this article with you today. I hope you found it informative and interesting. Iâll be back next Sunday with more insights and stories. Until then, I wish you a great day and all the best.đ.






