Zero-knowledge identity orchestration

AegisVLT

The passkey-native identity vault that turns repeated onboarding into one verified, user-controlled release.

Users keep their personal data in an encrypted vault. Partners ask for the exact fields they need. AegisVLT handles consent, cryptographic proof, and secure delivery without turning identity into another copied form.

Non-custodial vault Passkey authentication Selective disclosure Partner-ready SDKs

For users

One vault for verified identity, payment, recovery, and consent.

For platforms

Lower onboarding friction without absorbing raw PII liability.

For regulated flows

Granular proof, durable audit trails, and revocable access windows.

Why it matters

Identity should move at checkout speed without giving up control.

The old path

Every partner copies the same form.

Users repeat onboarding, platforms duplicate sensitive fields, and trust depends on how many databases now contain the same data.

The AegisVLT path

Identity becomes a signed, consented release.

The user unlocks with a passkey, approves the request, and only the selected data moves through a cryptographically verifiable channel.

The platform result

Faster conversion with a smaller breach surface.

Partner apps integrate the flow once, request fewer fields, and receive structured responses that are easier to validate and audit.

Architecture

Built for modern browser constraints and modern privacy expectations.

  1. 01

    Partner site starts a request

    The web SDK opens a secure vault session with strict origin checks and field-level intent.

  2. 02

    User unlocks with a passkey

    A local cryptographic release path proves user presence without turning a password into the system anchor.

  3. 03

    Only approved fields are released

    The vault decrypts locally, packages the selected payload, and signs the response for the partner backend to verify.

  4. 04

    Consent remains visible and revocable

    Every access window is explicit, time-bounded, and ready for later audit.

Platform pillars

Security posture and product ergonomics are designed together.

01

Zero-knowledge storage

Encrypted blobs at rest. Decryption stays on the user side.

02

Passkey-native access

Biometric unlock replaces password reset flows and shared secrets.

03

Selective disclosure

Partners request only the attributes required for the transaction.

04

Iframe isolation

Vault orchestration runs in a separate origin with explicit messaging rules.

05

Backend verification

Responses are structured for signature validation and server-side trust checks.

06

Consent auditability

Access can be logged, revoked, and reviewed without leaking raw PII.

Developer fit

One frontend integration, one backend validator, one cleaner identity boundary.

AegisVLT is designed as an integration surface, not a monolith. Teams embed the web SDK, define requested claims, validate the signed response, and keep their own product flow intact.

Frontend

Launch vault sessions, request claims, and listen for approval events.

Backend

Verify response signatures before treating released identity as trusted input.

Experience

Remove long forms where verified identity already exists.

import { AegisVltClient } from "@aegisvlt/web-sdk";

const client = new AegisVltClient({
  partnerId: "viseon-checkout",
  mode: "production"
});

await client.openVault({
  requestId: "checkout-2026-001",
  fields: ["fullName", "email", "country", "over18"]
});

Trust model

Less copied data. More proof around what was released and why.

User agency

Release requests are explicit, bounded, and anchored to a user action.

Platform confidence

Responses arrive in a format ready for server-side verification and policy checks.

Operational clarity

Consent history, access scope, and recovery decisions stay legible to operators.

A new default for onboarding

Introduce the product now. Build the full app on top of the same vision later.