◆ HSM-Backed Cryptographic Identity
Digital Identity
Infrastructure API
Hardware-secured ECDSA P-384 key pairs, identity lifecycle management, and cryptographic verification — built for zero-trust architectures.
API Endpoints
POST/v1/identitiesCreate identity + HSM key pair
GET/v1/identities/{id}Retrieve identity & public key
POST/v1/identities/{id}/suspendSuspend identity (reversible)
POST/v1/identities/{id}/revokeRevoke identity + destroy key
GET/healthzService health check
Quick Start
curl -X POST https://rid.deploymt.com/v1/identities \
-H "Content-Type: application/json" \
-H "Authorization: Bearer YOUR_API_KEY" \
-d '{"display_name": "My First Identity"}'
{
"id": "4bd2ad72-...",
"public_key_pem": "-----BEGIN PUBLIC KEY-----\nMHYw...",
"key_algorithm": "ECDSA_P384_SHA384",
"status": "active"
}
Architecture
⟶
⟶
⟶
📚
PostgreSQL
Identity Store
Security Properties
🛡
HSM Key Boundary
Private keys never leave the HSM. Only public keys and signatures cross the boundary.
🔄
Compensating Transactions
If DB insert fails after key generation, HSM key is automatically destroyed.
🔎
Full Audit Trail
Every identity operation is recorded with actor, timestamp, and event details.
🚫
Cryptographic Revocation
Revoking an identity destroys the HSM key, ensuring non-recovery.
🌐
Zero-Trust Network
NetworkPolicy restricts HSM proxy access to rid-core only.
🔐
Bearer Token Auth
Every request authenticated. mTLS in production deployment.