EVOLUTION · WEB2 → WEB3 → WEB7
Three eras of identity.
Web2 trusted central providers. Web3 collapsed identity into a single wallet key. Web 7.0 makes identity verifiable, private, and sovereign — by design.
WEB 2.0
Managed Identity
Auth0 · Okta · WorkOS
You are a row in their database.
// Web 2.0 — central trust
const session = await auth0.login({
email, password,
});
// → session.user_id on their server
// → if they leak, you leakWEB 3.0
Wallet Identity
MetaMask · SIWE · WalletConnect
You are your wallet — and only that.
// Web 3.0 — wallet = identity
const sig = await wallet.signMessage(
`Sign in: ${nonce}`
);
// → 0x address only
// → no verifiable claims, no privacyWEB 7.0
Sovereign + Verifiable
Kynetra Auth
Verifiable. Private. Sovereign.
// Web 7.0 — DID + VC + ZKP
const proof = await kynetra.present({
did: "did:kynetra:abc...",
reveal: ["over18"], // ZKP
// → no DOB ever transmitted
});SECTION 04 · ARCHITECTURE
The 7-layer identity stack.
From persistent storage to decentralized credentials, every concern lives at its own layer with clean contracts between them. Click any layer to expand.
Decentralized Identity Layer
DIDs, VCs, ZKPs and the W3C stack — the spine of Web 7.0 identity.
AI & Intelligence Layer
Every auth request is ML-scored in real time. Trust becomes adaptive.
Experience Layer
Pixel-perfect surfaces for admins, end-users and developers.
API Gateway (Edge)
Verification at the edge — sub-50ms anywhere on Earth.
Identity Services
13+ identity methods — classical, modern, and Web 7.0.
Platform Services
Multi-tenant operations, audit, billing, hooks.
Data & Persistence
The verifiable substrate — relational, cache, registry.
SECTION 05 · METHODS
14 identity methods. One API.
Classical, modern, and Web 7.0 — every authentication primitive your enterprise needs, from passwords to DID-based auth and verifiable credentials.
Password
Magic Link
Google OAuth
GitHub OAuth
Microsoft OAuth
Apple OAuth
Discord OAuth
SAML 2.0
OIDC
WebAuthn / Passkeys
MFA (TOTP)
DID Auth
VC-based Auth
SCIM 2.0
Decentralized Identifiers.
The did:kynetra method is a W3C-conformant DID method backed by Kynetra Auth's verifiable registry. Each identifier resolves to a DID Document containing public keys, service endpoints, and rotation history — fully owned by the subject.
DID FORMAT
DID DOCUMENT (JSON-LD)
{
"@context": "https://w3.org/ns/did/v1",
"id": "did:kynetra:z6Mkv...abc123",
"verificationMethod": [{
"id": "#key-1",
"type": "Ed25519VerificationKey2020",
"controller": "did:kynetra:z6Mkv...",
"publicKeyMultibase": "z6Mkv..."
}],
"authentication": ["#key-1"],
"assertionMethod": ["#key-1"],
"service": [{
"id": "#kynetra-vc",
"type": "VerifiableCredentialRegistry",
"serviceEndpoint": "https://vc.kynetra.dev"
}]
}SECTION 07 · VERIFIABLE CREDENTIALS
Sign once. Verify anywhere.
W3C Verifiable Credentials 2.0 — cryptographically signed claims (JWT-LD) that can be presented selectively, verified offline, and revoked through a public registry. No phone-home required.
SECTION 08 · ZERO-KNOWLEDGE PROOFS
Prove everything.
Reveal nothing.
Zero-Knowledge Proofs let users prove facts without revealing the underlying data. Powered by Pedersen commitments and Merkle membership proofs — selective disclosure as a first-class API.
USE CASE 01
Prove age > 18
without revealing DOB
kynetra.zkp.prove({
claim: "ageOver18",
attr: "dob",
})USE CASE 02
Prove balance > $X
without revealing balance
kynetra.zkp.prove({
claim: "balanceOver",
threshold: 50000,
})USE CASE 03
Prove residency
without revealing address
kynetra.zkp.prove({
claim: "residentOf",
region: "EU",
})PRIMITIVE 01
Pedersen Commitments
Bind a value to a public commitment without revealing it. Hide arbitrary attributes while still proving relations between them.
PRIMITIVE 02
Merkle Membership
Prove a leaf belongs to a set with a logarithmic-size proof — perfect for whitelist membership, geo, or org-graph proofs without disclosure.
SECTION 09 · COMPARISON
Beyond Auth0, Clerk, WorkOS, Okta.
Every classical auth feature, plus the full Web 7.0 identity stack. Side-by-side, the gap is the future.
| Feature | Auth0 | Clerk | WorkOS | Okta | Kynetra Auth |
|---|---|---|---|---|---|
| Decentralized Identity (DID) | ❌ | ❌ | ❌ | ❌ | ✅ did:kynetra |
| Verifiable Credentials (W3C VC 2.0) | ❌ | ❌ | ❌ | ❌ | ✅ |
| Zero-Knowledge Proofs | ❌ | ❌ | ❌ | ❌ | ✅ |
| Self-Sovereign Identity | ❌ | ❌ | ❌ | ❌ | ✅ |
| Edge-Native (Workers) | ❌ | ⚠️ | ❌ | ❌ | ✅ |
| AI-Native Risk Scoring | ⚠️ | ❌ | ❌ | ⚠️ | ✅ |
| Hash-Chained Audit | ❌ | ❌ | ❌ | ❌ | ✅ |
| OIDC4VCI / OIDC4VP | ❌ | ❌ | ❌ | ❌ | ✅ |
| eIDAS 2.0 Ready | ❌ | ❌ | ❌ | ❌ | ✅ |
| Multi-Tenant | ✅ | ✅ | ✅ | ✅ | ✅ |
| SAML / OIDC / Social | ✅ | ✅ | ✅ | ✅ | ✅ |
| Passkeys / WebAuthn | ✅ | ✅ | ✅ | ✅ | ✅ |
| MFA (TOTP) | ✅ | ✅ | ✅ | ✅ | ✅ |
| SCIM | ✅ | ⚠️ | ✅ | ✅ | ✅ |
✅ = full support · ⚠️ = partial / limited · ❌ = not available
SECTION 10 · AI-NATIVE RISK
Every request, ML-scored.
Behavioral biometrics, device fingerprinting, and contextual signals fuse into a real-time risk score. Adaptive step-up policies trigger MFA only when risk warrants it.
SECTION 11 · EDGE-NATIVE
Verified at the edge.
Cloudflare Workers + a JWKS KV cache mean JWT and DID verification happen at the PoP nearest your user. No datacenter round-trip. Sub-50ms p99 verification, globally.
SECTION 12 · AUDIT
Tamper-evident. Always.
Every audit event is hashed with the prior event's hash — a cryptographic chain that breaks visibly if any record is altered. SOC 2, ISO 27001, GDPR Article 25 by default.
SHA-256 CHAIN
COMPLIANCE
Audit logs export to your SIEM (Splunk, Datadog, Elastic) over webhook, S3, or pull API. Each event is signed and hash-chained to the prior event — making silent edits cryptographically impossible.
SECTION 13 · DEVELOPER EXPERIENCE
SDKs that just work.
Drop-in TypeScript, React components, mobile SDKs. Replace your existing Auth0 / Clerk integration in 30 minutes.
SECTION 14 · STANDARDS
Open. Interoperable.
We don't lock anyone in. Kynetra Auth speaks every relevant identity standard — old, new, and emerging.