This specification defines the DID Identity DID (DID) DID method, did:did. that supports DIDs based on any other DID method.

Introduction

did:did is a DID method that enables using any valid Decentralized Identifier (DID) as a did:did DID.

Core Concepts

DID Identity DID Scheme

The namestring that shall identify this DID method is: did. A DID that uses this method MUST begin with the prefix did:did. As per the DID specification, this string MUST be in lowercase.

The full DID Identity DID scheme is defined by the following ABNF, based on DID Syntax:

did-did     = "did:" did
  

Example DID Identity DID: did:did:example:1234.

Operations

Authorization

Any authorization valid for the DID Controller (the unprefixed DID) SHOULD be accepted as valid for its corresponding did:did DID.

Create (Register)

A DID Identity DID may be created by appending the prefix did: to any existing DID.

Read (Resolve)

To resolve a did:did DID, the following steps MUST be followed:

  1. Remove the "did:" prefix to obtain the unprefixed DID.
  2. Construct a DID document with the controller property set to the unprefixed DID.
  3. Return the resulting DID document.
{
  "@context": ["https://www.w3.org/ns/did/v1"],
  "id": "did:did:example:1234",
  "controller": "did:example:1234"
}
    

Update (Replace)

As a did:did DID is purely generative, there is no Update operation.

Delete (Revoke)

As a did:did DID is purely generative, there is no Delete operation.

Security & Privacy

Security Considerations

Security considerations for the unprefixed DID method apply to any use of the did:did DID method, including regarding forms of attack such as eavesdropping, replay, message insertion, deletion, modification, denial of service, storage or network amplification, and man-in-the-middle.

A full list of requirements for this section may be found at W3C Decentralized Identifiers 7.3

Denial of Service

Implementations must take care to avoid unbounded stack growth through repeated prefixing of "did:" in input DIDs. Implementations may set a maximum dID length or "did:" nesting level for this purpose.

If some DID methods have a high resource burden, use of did:did with those DID methods inherits that characteristic.

Residual risks

A did:did inherits any residual risks associated with its underlying DID.

Misattribution

User and applications should distinguish between a did:didand its corresponding unprefixed DID, but understand that the unprefixed DID is the controller of the did:didDID.

Uniqueness of assignment

Unique assignment of DIDs using did:did depends on the underlying unprefixed DID methods. Additional did:did DIDs may be generated by appending successive "did:" prefixes to a DID.

Chaining

did:did may be used with an existing did:did DID, with arbitrary levels of nesting. Each DID document has as its controller the DID obtained by removing a single "did:" prefix, forming a chain back to the non-did:did DID. The DID controller relationship is considered to be transitive for this purpose.

Method-specific endpoint authentication

did:did has no method-specific endpoints.

Signatures on DID Documents

did:did DID documents are resolved deterministically from the DID, and so do not rely on a signature on the document.

Privacy Considerations

did:did offers no privacy guarantees other than those of the underlying DID methods.

A full list of requirements for this section may be found at W3C Decentralized Identifiers 7.4

Correlation

A did:did DID is trivially correlated with its underlying DID.

DID URLs

A did:did DID supports DID URLs if the underlying DID method does, including use of paths. A DID URL based on a did:did may be dereferenced by dereferncing the underlying DID.

Reference Implementations

The following is an example implementation of did:did in the J programming language to resolve did:did:did:example:123 to did:example:123 in O(n) + C runtime where n is the number of resolutions:

j=: #@[ }. <@[ ;@,. ]
s=: #@[ }.each [ (E. <;.1 ]) ,
':' j 'did' ; (< 'did') (~: # ]) (':' s 'did:did:did:example:123')    
    

At this point, DID resolution proceeds as per the DID's method.

Resources