This is an advanced guide for those who want to integrate AI Agents with the Cheqd Network to create DIDs and Issue Verifiable Credentials.
The Cheqd MCP Server is a specialised implementation of the Model Context Protocol (MCP) that integrates with the cheqd network to provide secure decentralised identity management capabilities for AI applications. Built on the powerful combination of MCP's standardised context protocol and cheqd's robust identity infrastructure, this server enables AI agents to perform sophisticated identity operations while maintaining security, privacy, and verifiability.
Our MCP server is designed as a modular toolkit that can be easily integrated with existing AI workflows, particularly through Claude Desktop, Cursor, and other MCP-compatible client applications.
Enhanced AI Trust and Verification: Enable AI agents to create, resolve, and verify decentralised identities, establishing a foundation of trust for AI interactions.
Verifiable Credential Management: Simplify the issuance, verification, and management of verifiable credentials through standardised tools.
Decentralised Identity Operations: Leverage cheqd's blockchain infrastructure for creating and managing DIDs with cryptographic security.
Standardised AI Context: Utilise the Model Context Protocol to provide structured and verifiable context for AI interactions.
Human-in-the-loop Security: MCP's approval-based tool execution model ensures humans maintain oversight of sensitive identity operations.
Interoperable Integration: Seamlessly connect with existing identity ecosystems through the cheqd network and Credo Toolkit.
The server includes deep integration with the Credo Toolkit (@cheqd/mcp-toolkit-credo
), which provides a comprehensive set of tools for interacting with the cheqd network through the OpenWalletFoundation's Credo-TS framework. This integration enables:
DID Management: Create, update, resolve, and deactivate DIDs on the cheqd network.
Resource Operations: Create and resolve DID-linked resources.
Schema Management: Define and retrieve credential schemas for standardised credential formats.
Connection Management: Establish secure DIDComm connections between identity holders and verifiers.
Credential Issuance: Generate and issue verifiable credentials with cryptographic proofs.
Verification Protocols: Implement zero-knowledge proof verification for enhanced privacy.
The Credo Toolkit abstracts the complexity of these operations, presenting them as simple, well-documented MCP tools that can be invoked by AI agents with appropriate permissions. By leveraging the Credo Toolkit integration, the MCP server provides comprehensive tools for managing the full lifecycle of decentralised identifiers (DIDs) and verifiable credentials on the cheqd network.
The Cheqd MCP Server is particularly well-suited for scenarios requiring trusted AI interactions with verifiable identity information:
AI-Assisted Identity Verification: Enable AI agents to verify user identities through cryptographically secured credentials.
Credential Issuance Workflows: Streamline the creation and issuance of verifiable credentials through AI-guided processes.
Trusted Data Exchange: Facilitate secure sharing of verified data between organisations using AI intermediaries.
Identity-Aware AI Systems: Build AI applications that respect privacy and understand the provenance of identity information.
Cross-Domain Verification: Enable verification of credentials across different systems and networks through the cheqd infrastructure.
Self-Sovereign Identity Management: Support user control over identity information while enabling AI assistance for complex operations.
An MCP Compatible Desktop based AI Agent. We have tested with Claude Desktop.
Node.js 20 or higher (if running using npx).
Docker Desktop (if running using docker). This is preferred when running the ACA-Py demo.
Working understanding of cheqd network: Understanding of DID operations and verifiable credentials
The Cheqd MCP Server is configurable through environment variables:
TOOLS
Comma-separated list of tools to enable
"credo"
CREDO_CHEQD_TESTNET_MNEMONIC
Mnemonic for cheqd testnet wallet
Yes
CREDO_PORT
Port for the Credo agent
No
CREDO_NAME
Name for the Credo agent
No
CREDO_ENDPOINT
Public endpoint for DIDComm connections
No
Get the docker-compose.yaml
specially designed for Claude:
Update your local env.example
file with the required environment variables:
Replace your-testnet-mnemonic
with a valid mnemonic for the cheqd testnet. You can generate one using the cheqd CLI or get one from the cheqd faucet.
Add the following configuration to your claude_desktop_config.json or .cursor/mcp.json
When successfully started, the number of tools available to Claude Desktop will increase.
There may be a error on top right corner, but it can be safely ignored. It is because of port binding, as Claude creates two processes for each MCP Server.
The server automatically connects to the cheqd testnet using the provided mnemonic. This connection is used for all DID operations and credential management.
To verify the connection to the cheqd network, you can use the server to create and resolve a DID. You can ask the following to the AI Agent:
"Can you create a DID on the cheqd network?"
If configured correctly, the server will create a new DID and then display its complete DID document, confirming proper connection to the cheqd network.
Now that you have the Cheqd MCP Server running, you can:
Explore the available tools for DID management and credential operations
Create your first verifiable credential using the provided tools
Set up a complete identity verification workflow
Tutorial: Issue a Verifiable Credential using MCP Toolkit
Follow these instructions to Issue a new Credential from your MCP Client (e.g. Claude Desktop) using the MCP Toolkit.
⚠️ Before you begin...
Make sure you have configured the MCP Client as per the setup instructions.
Our docker-compose file contains "demo" profile, which includes a Holder ACA-py Agent setup. Start the Holder Agent with the following command
Although, either agents can start the connection, in this tutorial we will start the invite from Holder.
Open the Holder API at http://localhost:4001/api/doc or use Postman, to create a new connection request. Copy the invitation_url
from the response.
Parameters and Request Body
For automated acceptance, pass the following parameters:
A simple request body is below:
Go to Claude Desktop, and accept the connection by pasting the invitation_url
value.
Always "Allow for this chat" or "Allow once" when the prompt appears. This is a security feature to have human interaction for MCP tools.
Now you can ask Claude Desktop to issue a Credential Offer to the connection. Claude will interpret the message automatically and do all the steps necessary to issue a Credential Offer.
For this tutorial, we asked Claude to create a credential offer with score as 80 and subject as Mathematics.
When all the steps are completed, a Credential Offer will be sent to Holder agent.
The rest of the steps are from the Holder to accept the credential offer and store the credential. This can be achieved by the following API Calls from the Holder API at http://localhost:4001/api/doc or Postman.
Parameters
Filter on "offer-received" state
Copy and save the cred_ex_id
from the response and pass that in the next request to Accept the Offer.
Now, store the received Credential into the Holder wallet.
Tutorial: Verify a Credential using MCP Toolkit
Follow these instructions to Verify a Credential from your MCP Client (e.g. Claude Desktop) using the MCP Toolkit.
⚠️ Before you begin...
Make sure you have configured the MCP Client as per the setup instructions and issued a Credential from the same MCP Client.
If the connection was disrupted, create a new connection between the Holder and Claude Desktop.
Ask Claude to issue a proof request with some conditions based on the attributes of your credential.
For this tutorial, we asked Claude to generate a proof request with score > 50.
The next steps are at the Holder Agent side to accept the proof request and send the response. It can be simulated by running the following APIs in sequence from the Holder API at http://localhost:4001/api/doc or Postman.
Parameters
To narrow down the latest proof request, pass the following parameters
Copy and save the pres_ex_id
and the proof request by_format.pres_request.anoncreds
from the response.
Fetch the relevant credentials and then create a proof response. Send the proof response by calling the below API.
Request Body
For this tutorial, as the credential is AnonCreds, we are sending an AnonCreds proof in the body. The values will be based on the presentation request and the credentials retrieved in the previous two steps.
Finally, you can ask Claude to check the status of the Proof Request with the following prompt.
"Can you check the status of the proof request?"
Claude should get the latest status and summarise if the verification result was true or false.