Skip to main content
Version: 0.7.0
Latest
You're viewing the latest release of the United Nations Transparency Protocol.
For upcoming changes, check out the latest Work in Progress.

Implementation Registers Architecture

info

Please note that this specification is suitable for pre-production pilot implementations.

The implementation governance layer is organised as four registers — the technical roots of the UNTP governance tree. Together they catalogue the software, extensions, conformity schemes, and identifier infrastructure that every UNTP implementation draws on.

Registration is a continuous process, not a one-shot certification event. An implementer publishes a DID, signs a registration Verifiable Credential, and exposes their service or credentials at a stable URL. From that point onward, the UNTP registrar agent (did:web:registrar.uncefact.org) crawls each registered implementation on every observation cycle, validates conformance against published tests, and writes signed observations back to the register. Status reflects observed reality, not declared intent — critical at the scale UNTP is designed for, where millions of independent implementers cannot be manually audited.

The four registers

RegisterCataloguesWhat the implementer publishesWhat the agent verifies
SWI — Software ImplementersSoftware vendors and the build versions they shipDID + registration VC + an issuingSoftware block in every credential the software issuesSignature, schema conformance, vocabulary conformance, optional binding-credential alignment, sample evidence per software version
EXT — Community ExtensionsUNTP credential extensions defined by member organisationsDID + registration VC + extension schema, JSON-LD context, and vocabulary at stable URLsSchema/context/vocabulary content hashes, UNTP context import, no UNTP redefinitions, all terms resolved, samples validate
CVC — Conformity Vocabulary CatalogueConformity schemes (audit, assessment, certification programs)DID + registration VC + a UNTP-conformant CVC vocabulary at a stable vocabularyURLVocabulary URL reachable, CVC schema conformance, profile/version URI immutability, topic URI resolution, standard/regulatory alignment reachability
IDR — Identifier SchemesIdentifier schemes for products, facilities, organisations, members, and key assetsDID + registration VC + a publicly reachable resolver service URLRegistry URL reachable, identifier pattern compiles, resolver template resolves, optional UNTP IDR conformance, optional DIA issuance verification

Each register has its own governance document with the full publishing checklist, validation rules, and lifecycle. Per-register detail is linked in the sections below.

Why this model

Self-attestation does not scale to millions of implementers — there is no way to manually audit a million conformance claims, and even sampling becomes unreliable. The agent-driven model gives verifiers two things self-attestation cannot:

  1. Continuous integrity, because every observation is a freshly-signed Verifiable Credential, and any drift from the registered configuration (silent schema changes, broken resolvers, unsigned credentials, forged software claims) is detected on the next crawl cycle.
  2. Cryptographic auditability, because observations are append-only and signed by the registrar agent's DID — no party can quietly modify history, including UNECE.

The implementer's job stops at "publish your DID, issue a registration VC, expose your service at a stable URL." Everything downstream — observation, validation, drift detection, status updates — is the agent's job.

Per-register detail

Each register is documented in depth on its own page — including the full publishing checklist, validation rules, lifecycle, and the catalogued entries themselves.

RegisterBrowse entriesHow to registerGovernance document
SWI — Software ImplementersSoftware registerRegister your softwareSWI governance
EXT — Community ExtensionsExtensions registerRegister an extensionEXT governance
CVC — Conformity Vocabulary CatalogueScheme owners registerRegister a schemeCVC governance
IDR — Identifier SchemesIdentifier registersRegister an identifier schemeIDR governance

Conformity Assessment Bodies

Conformity assessment bodies (CABs) — auditors, certifiers, testing laboratories, and inspection bodies — issue Digital Conformity Credentials (DCCs) carrying independently verified assessments. CABs do not have their own register; instead they consume three of the four registers and produce credentials that the SWI register's agent observes:

  • They use SWI-registered software to issue DCCs (their software's issuingSoftware block appears in every DCC).
  • They reference CVC-registered schemes and profile versions in attestation.assessmentScheme.
  • They may be members in IDR-registered industry-association schemes (e.g. an RBA-recognised audit firm).

A CAB's DID typically appears as the issuer of DCCs in the wild. The SWI register's continuous observation cycle therefore validates CAB-issued credentials as a side-effect of validating the software that issued them. CAB-specific registration is not separately required.

Detailed implementation guidance for specific stakeholder types (producers, regulators, conformity bodies, consumers) is on the Implementation Plans page.

The trust anchor architecture

The four registers connect to form a continuous trust chain that anchors at UNECE.

UNECE issues a registrar Digital Identity Anchor (DIA) credential about each registered DID across all four registers — software vendors (SWI), extension owners (EXT), scheme owners (CVC), and identifier scheme operators (IDR). The DIA cryptographically binds the registrar's DID to its registered identity and the components it operates. Each DIA is hosted on the corresponding register entry as the trust anchor for downstream verifiers.

When a registered party then issues their own credentials — a SWI-listed vendor's software issuing DPPs, an IDR-listed industry association issuing member DIAs, a CAB issuing DCCs — verifiers can chase the trust chain back to UNECE without trusting any single party blindly:

UNECE  ──signs registrar DIA──▶  Registered DID
(in IDR/SWI/EXT/CVC)

▼ signs
Member / Software-issued
/ Extension-defined credential

▼ verified by
Verifier with trust chain
anchored at UNECE

This makes UNTP's identity layer cryptographically continuous from the UN level all the way down to a single batch-level DPP. A verifier encountering an unfamiliar industry-association DIA can resolve the issuer's DID, find the registered IDR entry, fetch the UNECE-issued registrar DIA from that entry, and confirm the chain — without prior trust relationships and without intermediary brokers.

Conformance testing — playground and continuous observation

UNTP provides two distinct conformance-testing surfaces serving two different purposes:

Test playground (pre-production, implementer-driven)

The hosted test playground and the locally deployable full test service are for implementers to validate their work during development, before publishing anything. The playground exercises the same three-tier test architecture:

TierWhat it testsUNTP CoreExtension
Tier 1 — TechnologyW3C Verifiable Credential complianceAll credential issuersNo additional requirements expected
Tier 2 — SchemaSchema validity for each credential typeUNTP core schemasExtended credentials must validate against both core and extension schemas
Tier 3 — Trust GraphCorrect linking between DPP, DTE, DCC, DFR, and DIA credentialsStandard credential linkingExtension-specific choreography and linking rules

The playground is self-service and produces evidence credentials that implementers can attach to their registration VCs.

Continuous registrar-agent observation (production, agent-driven)

The same conformance dimensions are then enforced continuously by the UNTP registrar agent against credentials and artefacts published in production. Where the playground is implementer-driven and point-in-time, the agent is registrar-driven and continuous. The agent's observations are signed Verifiable Credentials recorded in the relevant register and visible to any verifier.

Together, the playground reduces the cost of getting a registration right the first time, and the agent ensures registration stays right over time.

The key principle across both surfaces is that a credential conforming to a UNTP extension is also conformant with UNTP core. This ensures that credentials issued in a specific industry or geographical context remain understandable across industry or geographic boundaries.