Skip to main content


Welcome to the Identity Documentation!

Here you can find out more about how you can use our toolkits to verify your user's identities, securely validate identities for third-parties, and build dApps that safely manage your user's identities.

Identity validators and identity requesters should start by looking at the Gateway Protocol.

What is the Gateway Protocol?

The Gateway Protocol allows both identity requesters and identity validators (also known as Gatekeepers) to securely and privately verify a person's identity on-chain.

The Gateway Protocol is permissionless, allowing a wide variety of Gatekeeper Networks to act as identity validators for dApps that need identity verification.

Gatekeeper Networks are made up of identity validators who are compensated for performing identity verification tasks for supported dApps. Each Gatekeeper Network has its own set of rules and requirements which are determined by the Gatekeepers. Gatekeepers can vote for changes both within their Gatekeeper Network and for the broader Gateway Protocol.

What is did:sol?

Decentralized identifiers (DIDs) are a tool that allows users to manage their identity on blockchains. And did:sol is the official DID method for the Solana blockchain. This means that did:sol:

  • Defines how DIDs work on Solana
  • Offers performance benefits to the controller
  • Supports different Solana verification methods
  • Provides an identifier for use both on-chain and off-chain

What is Cryptid?

Cryptid allows developers to securely interact with transactions using a user's DID instead of with their private key. It integrates with Solana, and is geared towards developers working with on-chain dApps. Developers can make it easy for users to sign transactions and prove their identity while keeping their personal information private and secure. This allows developers to build a variety of features including:

  • Access control that delegates a user's assets to a trusted party
  • Back-up options for a user's wallet in case of lost access
  • Safety features to rotate a compromised user key
  • Multi-account and multi-device access to a user's assets

Next Steps

Now that you know what each Identity product does, you can jump in and get started with our how-to guides:

  • Verify Your First User
  • Become an Identity Validator
  • Join a Gatekeeper Network
  • Store a DID
  • Sign Transactions