Get Started with TRAIN
Anchor DIDs in DNS records and validate trust chains using TRAIN.
What is TRAIN?
TRAIN (TRust mAnagement INfrastructure) is a framework, led by the team at the Fraunhofer Institute, for establishing and validating decentralized trust. It allows ecosystems to verify whether Verifiable Credentials (VCs) were issued by authorized and trustworthy entities through cryptographically linked trust chains.
TRAIN includes two core components:
TRAIN Trust Validator (TTV): A service that validates the issuer of a Verifiable Credential by tracing Verifiable Accreditations up to a trusted root authority.
TDZM (Trust-DNS Zone Manager): A DNS component that enables Root Trusted Accreditation Organisations (rTAOs) to publicly anchor their Decentralized Identifiers (DIDs) in DNS.
Together, these components allow for governance-aware, high-assurance validation of digital credentials without centralized trust registries.
How TDZM and the TRAIN Trust Validator Work Together
TDZM
Anchors rTAO DIDs in DNS, establishing a verifiable and auditable trust root
TTV (TRAIN Trust Validator)
Validates VCs by following Verifiable Accreditations and optionally confirming the rTAO via DNS
When combined, they allow you to:
Establish a cryptographically linked trust hierarchy
Publish root DIDs (rTAOs) in DNS
Automatically validate credentials against published governance frameworks
Support scalable, decentralized ecosystems without compromising on assurance
Step-by-Step: Setting Up Trust and Validation
1. Deploy Trust-DNS Zone Manager (TDZM)
Run the TDZM backend and UI using:
Docker Compose (for testing or development)
Helm Charts in Kubernetes (for production)
TDZM includes:
A DNS nameserver to manage your trust zone
A backend API and UI for managing records
Optional OIDC authentication
2. Delegate DNS Control to TDZM
In your parent DNS zone (e.g. federation1.com
):
Add an NS record pointing your trust subdomain (e.g.
trust.federation1.com
) to TDZMAdd an A record to resolve the nameserverâs domain to its IP
Example:
3. Anchor the rTAO DID in DNS
Use TDZM to publish a TXT or TLSA DNS record that links your rTAOâs DID to the trust domain.
Example:
This enables the TRAIN Trust Validator to resolve and verify the rTAOâs authenticity.
4. Build the Trust Chain
Publish a Root Authorisation for Trust Chain from the rTAO
Issue Verifiable Accreditations from rTAO â TAOs â Trusted Issuers
Define governance rules and credential schema policies as needed
Set up Trust Chain
Design and build a trust chain for establishing a trust hierarchy in your ecosystem.
5. Use the TRAIN Trust Validator (TTV)
Send a JSON request to TTV with the credentialâs issuer, type, accreditation path, and optional DNS anchors. TTV will:
Traverse the Verifiable Accreditation chain
Verify structural and policy compliance
Optionally confirm the root via DNS lookups
Return a structured verification result
Summary
Anchor rTAO in DNS
đ TDZM
Manage trust zones
đ ī¸ TDZM Backend & UI
Define & delegate trust
đ Verifiable Accreditations
Validate credentials
đ TRAIN Trust Validator (TTV)
By combining DNS-based assurance with credential-level verification, the TRAIN infrastructure provides a flexible and scalable solution for decentralized trust governance.
Last updated
Was this helpful?