---
title: "Certificates & Trust"
description: "Understanding the XI Objects certificate hierarchy, trust chains, and identity management."
published: 2026-02-18T18:06:39.929509+00:00
updated: 2026-02-18T18:06:39.929509+00:00
tags: ["certificates", "security", "trust"]
url: https://xiobjects.com/docs/xio/concepts/certificates
source: XI Objects
---

<!-- xion:doctype xion+markdown -->
<!-- xion:metadata
{
  "version": "1.0",
  "content_type": "application/xion\u002Bmarkdown",
  "source_type": "xi-content/doc",
  "generator": "xio-content-publisher/1.0.0",
  "generated": "2026-02-18T18:04:34.6013107\u002B00:00",
  "encoding": "utf-8",
  "render_intent": "markdown",
  "title": "Certificates \u0026 Trust",
  "slug": "xio/concepts/certificates",
  "copyright": "\u00A9 2026 XI Objects Inc"
}
-->

# Certificates & Trust

XI Objects uses a hierarchical certificate system to establish and verify identity. Every piece of signed content is traceable back to a verified creator through a chain of trust anchored by the **Institute of Provenance Root CA**.

## Certificate Hierarchy

```mermaid
graph TB
    subgraph Root
        R[Institute of Provenance Root CA]
    end
    
    subgraph Intermediates
        I1[XI Objects Inc Control Intermediate]
        I2[Certified Orbital Intermediate]
        I3[Certified Orbital Intermediate]
    end
    
    subgraph Leaves
        C1["service-a (leaf)"]
        C2["service-b (leaf)"]
        C3["creator (leaf)"]
        C4["ci-pipeline (leaf)"]
    end
    
    R --> I1
    R --> I2
    R --> I3
    I1 --> C1
    I1 --> C2
    I2 --> C3
    I3 --> C4
    
    style R fill:#582c7e,stroke:#7a4a9e,color:#fff
    style I1 fill:#1a1a2e,stroke:#7a4a9e,color:#e1d5b9
    style I2 fill:#1a1a2e,stroke:#7a4a9e,color:#e1d5b9
    style I3 fill:#1a1a2e,stroke:#7a4a9e,color:#e1d5b9
```

### Institute of Provenance Root CA

The root certificate authority is the ultimate trust anchor for the ecosystem. It is:

- A self-signed Ed25519 certificate with long-lived validity (currently 2025–2035)
- Used exclusively to sign Intermediate CA certificates for certified Orbital operators
- Managed with strict key ceremony procedures
- Never exposed to online systems or network operations

### Control Intermediate Certificates

Certified Orbital operators receive intermediate certificates signed by the Root CA. These intermediates allow the operator's **Xio.Control** module to issue leaf certificates:

- Ed25519 certificates signed by the Root CA
- Multi-year validity (currently 2025–2030)
- Scoped to certificate issuance and record authority functions
- Each certified Orbital operator holds its own intermediate

### Leaf Certificates

Leaf certificates are **short-lived**, typically valid for hours to a single day. They are issued by the Control module running on a certified Orbital and used for content signing:

- Ed25519 public keys with certificates signed by the intermediate CA
- Short validity periods to limit exposure from key compromise
- Include a custom Extended Key Usage OID for XI Objects signing
- Issued on-demand through the Xio.Control PKI API

## Certificate Lifecycle

```mermaid
stateDiagram-v2
    [*] --> Requested
    Requested --> Active : Issued by Control
    Requested --> Rejected : Denied
    Active --> Expired : Validity period elapsed
    Active --> Revoked : Key compromise / policy
    Expired --> [*]
    Revoked --> [*]
    Rejected --> [*]
```

### Issuance

Leaf certificates are issued through the Control module. The Control module must be activated with valid root and intermediate certificate material before it can issue certificates.

The Control module validates the request, generates the leaf certificate signed by its intermediate CA, and returns the certificate with the full chain.

### Revocation

If a private key is compromised, certificates can be revoked immediately through the Control module.

Revocation state is maintained in a **Sparse Merkle Tree**, enabling cryptographic proofs of both inclusion and exclusion. A verifier can prove that a certificate *has* been revoked, or prove that it has *not* been revoked, without trusting the server.

## Verification

When verifying signed content, XI Objects checks the full certificate chain embedded in the trust block:

1. **Signature validity**: Is the Ed25519 signature mathematically valid against the content hash?
2. **Chain integrity**: Does the certificate chain trace from leaf → intermediate → Institute of Provenance Root CA?
3. **Revocation status**: Has any certificate in the chain been revoked? (verified via Sparse Merkle proofs)
4. **Temporal validity**: Was the leaf certificate valid at the time the content was signed?

The trust block carries the complete X.509 certificate chain (PEM-encoded, leaf-first), so verification can be performed independently.

## Key Storage

Private keys for Ed25519 signing should never be stored in plaintext. The signing architecture uses a **delegate pattern**: the private key is held externally and a `SignDataAsyncDelegate` is provided to the trust signer, allowing integration with various secure backends:

| Backend | Security Level | Use Case |
|---------|:---:|----------|
| File system (encrypted) | Medium | Development and testing |
| OS keychain | High | Desktop applications |
| Azure Key Vault / HSM | Very High | Production deployments |
| Hardware Security Module | Highest | Root CA and intermediate CA operations |

## Sparse Merkle Tree Proofs

XI Objects uses Sparse Merkle Trees (SMTs) as the verifiable data structure backing certificate state. This enables:

- **Inclusion proofs**: Cryptographic proof that a certificate or record exists in the current state
- **Exclusion proofs**: Cryptographic proof that a certificate has *not* been revoked
- **State roots**: A single hash (the SMT root) that commits to the entire certificate registry state
- **Epoch advancement**: State roots are signed and advanced at regular intervals by the Control module
<!-- xion:trust
{
  "v": 1,
  "canon_v": 1,
  "ctx": "xiobjects.com/content",
  "hash_blake3_hex": "1d52fc2b116b9ba6f7dfab8d205b97dd989a7c8ec4fea8b3d628e0e3165e4b6c",
  "hash_sha256_hex": null,
  "sig_alg": "ed25519",
  "sig_b64": "1xLIcGWFM7ZYyesB0eGmWMiUlNkhpYk_Tdn1AeNGAJpwbjm-HCxCgXBs9DXxlAT4hWQGFovkW_n1kTZ0O3wFAQ",
  "pubkey_b64": "ff4Npz7sRQH_vUn9FY8Wrc8v_00Z49h15EyQgKVTHR0",
  "x509_chain_pem": [
    "-----BEGIN CERTIFICATE-----\r\nMIIB9TCCAaegAwIBAgIRAM4lRb8aI/FYHOJD5OYqefQwBQYDK2VwMC4xLDAqBgNV\r\nBAMMI1hJIE9iamVjdHMgSW5jIENvbnRyb2wgSW50ZXJtZWRpYXRlMB4XDTI2MDIx\r\nNTIyMDg0OFoXDTI2MDMxNzIyMDg0OFowSzEeMBwGA1UEAwwVeGlvLWNvbnRlbnQt\r\ncHVibGlzaGVyMRcwFQYDVQQKDA5YSSBPYmplY3RzIEluYzEQMA4GA1UECwwHQ29u\r\ndGVudDAqMAUGAytlcAMhAH3\u002BDac\u002B7EUB/71J/RWPFq3PL/9NGePYdeRMkIClUx0d\r\no4G8MIG5MAwGA1UdEwEB/wQCMAAwDgYDVR0PAQH/BAQDAgeAMBMGA1UdJQQMMAoG\r\nCCsGAQUFBwMkMGUGA1UdIwReMFyAFDspt5hZsP6rNX4Cq7owpMYa05OyoS6kLDAq\r\nMSgwJgYDVQQDDB9JbnN0aXR1dGUgb2YgUHJvdmVuYW5jZSBSb290IENBghRSYDf4\r\nsUJ\u002B9h\u002Bod0\u002BZRK/X/JSUBTAdBgNVHQ4EFgQUP5BTxnjCAxVKgMvFhx40ljlGOAkw\r\nBQYDK2VwA0EAjKlSBzHgXpPM2PA\u002BSJ/rMso5OEqtWIHGo/zr2QSuZRXhSWafIbk9\r\nZnl0kKZCqUB2HpCfgnpOGCPK6SlefwQsAQ==\r\n-----END CERTIFICATE-----\r\n",
    "-----BEGIN CERTIFICATE-----\r\nMIIByDCCAXqgAwIBAgIUUmA3\u002BLFCfvYfqHdPmUSv1/yUlAUwBQYDK2VwMCoxKDAm\r\nBgNVBAMMH0luc3RpdHV0ZSBvZiBQcm92ZW5hbmNlIFJvb3QgQ0EwHhcNMjUxMTAy\r\nMDMxNzEyWhcNMzAxMTAxMDMxNzEyWjAuMSwwKgYDVQQDDCNYSSBPYmplY3RzIElu\r\nYyBDb250cm9sIEludGVybWVkaWF0ZTAqMAUGAytlcAMhAFSS/pggSRmTcAMko7uc\r\nATH8OHgxVymd5mBFlPXbJkgio4GtMIGqMBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYD\r\nVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBQ7KbeYWbD\u002BqzV\u002BAqu6MKTGGtOTsjBlBgNV\r\nHSMEXjBcgBQAZRTDswSVORu\u002BkUOKX6WvrOvmQKEupCwwKjEoMCYGA1UEAwwfSW5z\r\ndGl0dXRlIG9mIFByb3ZlbmFuY2UgUm9vdCBDQYIUJqoJlpiSFg\u002B7W5IJLMrLttgR\r\nQp4wBQYDK2VwA0EA5FOht7YOsVRPp/FOKMQ\u002B3Mo9JxrvGR3ylKWAWNm6OUV7N3DB\r\nI9cD62wU5I0d0EKDBy0CX9DnoqUyxv5yguraAA==\r\n-----END CERTIFICATE-----\r\n",
    "-----BEGIN CERTIFICATE-----\r\nMIIBaTCCARugAwIBAgIUJqoJlpiSFg\u002B7W5IJLMrLttgRQp4wBQYDK2VwMCoxKDAm\r\nBgNVBAMMH0luc3RpdHV0ZSBvZiBQcm92ZW5hbmNlIFJvb3QgQ0EwHhcNMjUxMTAy\r\nMDMwNTEyWhcNMzUxMDMxMDMwNTEyWjAqMSgwJgYDVQQDDB9JbnN0aXR1dGUgb2Yg\r\nUHJvdmVuYW5jZSBSb290IENBMCowBQYDK2VwAyEAEWNZl\u002Br3IC7\u002BgBh90Yo1kWk1\r\npZCVzVuFdFT7qBBU8W2jUzBRMB0GA1UdDgQWBBQAZRTDswSVORu\u002BkUOKX6WvrOvm\r\nQDAfBgNVHSMEGDAWgBQAZRTDswSVORu\u002BkUOKX6WvrOvmQDAPBgNVHRMBAf8EBTAD\r\nAQH/MAUGAytlcANBAO6QeydOFNrN75qNyftggYudsxMyl4w9qWkSdZ6hlhrRcbSr\r\niG9Si0kbrIJOwYB/LTBU0RM4Rl\u002Bo9PM3Qp0mPwo=\r\n-----END CERTIFICATE-----\r\n"
  ],
  "key_id": "-GCB4sEBzFethc5Pd0Rzyn_6ySyHB4QaqD9DAoW9ViE",
  "created_at": "2026-02-18T18:04:34Z"
}
-->