Docs hub

From zero to first authorize call — in order.

A 9-step reading order (with one optional sidetrip on Continuity + Discoverability) from the problem statement to a working integration. Each step links to the canonical resource (vocabulary, schemas, SDKs, fixtures, sector profiles, whitepaper).

Curated reading order

From zero to first authorize call — in order.

Total reading time end-to-end: ~3 hours. Steps 1–5 are read-only (~75 minutes); steps 6–9 involve running code (~105 minutes including download and warm-up). Each step listed below carries a target read or run time.

  1. 1. The problemlanding + Protocol overview. Read time: ~10 min. Why authority cannot be a per-system problem; what the six primitives are; what KYE Protocol proves at runtime.
  2. 2. The vocabularygithub.com/KYE-Protocol/vocabulary. Read time: ~15 min. Entity types, action types, decision codes, reason codes, capability kinds, lifecycle states, signal types, obligations, redaction fields. 19 dictionary files.
  3. 3. The ID formatgithub.com/KYE-Protocol/id-format. Read time: ~10 min. URN scheme: kye:<class>:<trust-domain>:<subclass>:<local>. 18 documented classes.
  4. 4. Schemas + examplesgithub.com/KYE-Protocol/examples. Read time: ~25 min. 162 JSON Schemas + 129 validated examples. node scripts/validate-schemas.js walks every example through ajv on every CI run.
  5. 5. SDK quickstartDevelopers page quickstart. Read time: ~15 min. TypeScript and Python at full surface parity (HTTP client + crypto + errors + retry + webhook verifier + JWS HS256 / RS256); Go covers the core surface, with extension endpoints rolling out.
  6. 6. KYE Reference GatewayRun time: ~30 min. Run with docker run -p 4000:4000 ghcr.io/kye-protocol/gateway:v1.0, exercise POST /v1/runtime/authorize against the embedded fixture pack. Production hardening (auth, rate limit, body-size, structured logging, JSONL audit chain) is opt-in via env vars; the full hardening register ships under commercial licence to design partners (request the procurement pack).
  7. 7. Conformance + certificationcertification.html. Read time + run time: ~30 min. 5-tier badge ladder (L0 Declared → L4 KYE Certified) plus the capability-scoped Conformance ladder (Core / Authority / Capability / Evidence Conformant — programme in development). 40 fixtures, all passing in CI against the reference Gateway.
  8. 8. Sector profile — pick yours from sectors.html. Read time: ~30 min for one profile. 11 Connector Profile families, 58 v1.0 normative profiles. Adopt only what you need; Core never shifts beneath you.
  9. 8a. Continuity + Discoverability profilesKYE Continuity Profile and KYE Discoverability Profile. Read time: ~20 min combined. Continuity binds interpreted-vs-declared intent + multi-dimension state + pressure + incentive + oversight into a signed pre-commit verdict (decision values: continuity_preserved, continuity_degraded, continuity_broken; ten drift types). Discoverability turns the cryptographically-bound authority graph into a queryable surface with discovery policy, row-level masking, federation traversal, and signed audit emission per query (six discovery modes; three risk-discovery types).
  10. 8b. Ontology profileKYE Ontology Profile. Read time: ~15 min. The semantic layer that gives shared meaning to entities, authorities, capabilities, scopes, states, decisions, evidence, profiles, connectors and sectors. Defines twelve ontology domains, a stable predicate dictionary, and six explicit mapping types (equivalent, related_not_identical, not_equivalent, aliased_by, subsumes, subsumed_by) so OAuth scopes, IAM roles, payment mandates and healthcare consents map into KYE without false equivalence. JSON-LD context published; RDF / OWL optional.
  11. 8c. Operating Model profileKYE Operating Model Profile. Read time: ~20 min. The enterprise adoption layer. Ten ordered stages from use-case intake through readiness assessment, Entity Authority Record, Authority Gates, Commit Boundary, runtime decision, signed adoption Evidence Pack, review and improve. Eight gate types (payment, external message, contract, clinical, infrastructure, data export, credential rotation, evidence export); risk tiers low / medium / high / critical; lifecycle states proposed → pilot → controlled_production → production → deprecated → suspended → revoked.
  12. 8d. Assurance Card profileKYE Assurance Card Profile. Read time: ~20 min. The lifecycle assurance layer. Turns runtime evidence into a living assurance record per delegated entity. Eight lifecycle stages (design → pilot → deploy → monitor → incident_review → scope_change_review → retention_review → decommission); KYE Human Involvement Plan enforced as a runtime policy gate (deny on bypass); Provenance + supply-chain evidence for models, datasets, tools, suppliers, licences, hardware; KYE Assurance Review Cycle with ten triggers (scheduled, scope_change, new_capability, incident, risk_state_change, model_update, authority_change, supplier_change, licence_change, retention, decommission); decommissioning plan with cascade-revocation scope. Defence-grade reference: Alan Turing Institute / Accenture / UK MoD AI assurance work.
  13. 8e. Formal Rules profileKYE Formal Rules Profile. Read time: ~20 min. The rights, obligations and governance layer. Six rule families (permission, obligation, prohibition, power, immunity, exception) plus meta_governance. Compact normative operators (P, O, F, Pow, Imm, Ex). Eleven normative objects covering rules, permissions, obligations (with full lifecycle), prohibitions, powers, exceptions, governance rules, conflicts, proofs and obligation states. KYE Rule Prover checks consistency before deployment; KYE Control Compiler compiles formal rules into runtime authority gates + commit boundaries + signal events + evidence requirements; KYE Obligation Ledger tracks every obligation lifecycle hash-chained into the audit ledger.
  14. 8f. Action Admissibility profileKYE Action Admissibility Profile. Read time: ~15 min. The upstream pre-action layer. Checks whether a proposed action is admissible into the authority pipeline before any authority, formal-rule or commit-boundary check runs. Six decision values (admit, reject, require_clarification, require_human_review, quarantine, route_to_authority_check); fifteen inadmissibility classes (intent / scope / data / continuity / coercion / incentive / jurisdiction / accountability); KYE Admissibility Engine emits signed admissibility decision + admissibility evidence hash-chained into the audit ledger.
  15. 9. Whitepaperwhitepaper.html. Read time: ~45 min. The normative spec + governance + roadmap, end to end. Read this before any pilot scoping conversation.

Stuck? Open a discussion at KYE-Protocol/Discussions or use the Talk to us modal — pick the "Adoption” topic.

Reading order by role

Pick the path that matches your job.

Ready to see your AI agents flagged?

Start in shadow mode. We’ll deliver your first Evidence Pack in 4–8 weeks.