@ixo/ucan
v1.2.2
Published
UCAN authorization for any service - built on ucanto
Readme
@ixo/ucan
A framework-agnostic UCAN (User Controlled Authorization Networks) implementation for any service. Built on top of the battle-tested ucanto library and conforming to the UCAN specification.
What is UCAN?
UCAN is a decentralized authorization system using cryptographically signed tokens. Think of it as "JWT meets capabilities" - users can grant specific permissions to others, who can further delegate (but never escalate) those permissions.
Key concepts:
- Capabilities: What actions can be performed on which resources
- Delegations: Granting capabilities to others (can be chained)
- Invocations: Requests to use a capability
- Facts: Verifiable claims attached to a delegation or invocation (scoped per-UCAN, not inherited)
- Attenuation: Permissions can only be narrowed, never expanded
📖 See the visual flow diagram →
Features
- 🔐 Built on ucanto - Battle-tested UCAN library from Storacha
- 🎯 Generic Capabilities - Define your own capabilities with custom schemas
- ⚙️ Caveat Validation - Enforce limits and restrictions on delegations
- 🌐 Multi-DID Support -
did:key(native) +did:ixo(via blockchain indexer) +did:web(via HTTP) + local (in-memory registry) - 🚀 Framework-Agnostic - Works with Express, Fastify, Hono, NestJS, etc.
- 🛡️ Replay Protection - Built-in invocation store prevents replay attacks
Installation
npm install @ixo/ucan
# or
pnpm add @ixo/ucanQuick Start
1. Define a Capability
import { defineCapability, Schema } from '@ixo/ucan';
const EmployeesRead = defineCapability({
can: 'employees/read',
protocol: 'myapp:',
nb: { limit: Schema.integer().optional() },
derives: (claimed, delegated) => {
const claimedLimit = claimed.nb?.limit ?? Infinity;
const delegatedLimit = delegated.nb?.limit ?? Infinity;
if (claimedLimit > delegatedLimit) {
return {
error: new Error(
`Limit ${claimedLimit} exceeds allowed ${delegatedLimit}`,
),
};
}
return { ok: {} };
},
});2. Create a Validator (Server)
import { createUCANValidator, createIxoDIDResolver } from '@ixo/ucan';
const validator = await createUCANValidator({
serverDid: 'did:ixo:ixo1abc...', // Your server's DID
rootIssuers: ['did:ixo:ixo1admin...'], // DIDs that can issue root capabilities
didResolver: createIxoDIDResolver({
indexerUrl: 'https://blocksync.ixo.earth/graphql',
}),
});3. Protect a Route (Invocation)
app.post('/employees', async (req, res) => {
const result = await validator.validate(
req.body.invocation, // Base64-encoded CAR
EmployeesRead,
'myapp:company/acme',
);
if (!result.ok) {
return res.status(403).json({ error: result.error });
}
// result.invoker — DID of who made the request
// result.capability — validated capability with caveats (nb)
// result.expiration — earliest expiration across the delegation chain (undefined = never)
// result.proofChain — delegation path from root to invoker, e.g. ["did:key:root", "did:key:user"]
// result.facts — facts attached to the invocation (undefined if none)
const limit = result.capability?.nb?.limit ?? 10;
res.json({ employees: getEmployees(limit) });
});3b. Validate a Delegation
Use validateDelegation() to verify a standalone delegation token — e.g. when a client sends a delegation in a header alongside a traditional auth mechanism. This verifies the cryptographic signature chain, audience, and expiration without requiring a capability definition.
app.use(async (req, res, next) => {
const delegationHeader = req.headers['x-ucan-delegation'];
if (!delegationHeader) return next();
const result = await validator.validateDelegation(delegationHeader);
if (!result.ok) {
console.warn(
`Delegation invalid: [${result.error?.code}] ${result.error?.message}`,
);
return next();
}
// result.invoker — issuer DID (who granted the delegation)
// result.capability — first capability in the delegation
// result.expiration — effective expiration across the proof chain
// result.proofChain — e.g. ["did:ixo:root", "did:ixo:user"]
req.ucanDelegation = {
issuer: result.invoker,
capability: result.capability,
expiration: result.expiration,
};
next();
});4. Create & Use a Delegation (Client)
import {
generateKeypair,
createDelegation,
createInvocation,
serializeInvocation,
} from '@ixo/ucan';
// Generate a keypair for the user
const { signer, did } = await generateKeypair();
// Root creates a delegation for the user
const delegation = await createDelegation({
issuer: rootSigner,
audience: did,
capabilities: [
{ can: 'employees/read', with: 'myapp:company/acme', nb: { limit: 50 } },
],
expiration: Math.floor(Date.now() / 1000) + 3600, // 1 hour
});
// User creates an invocation
const invocation = await createInvocation({
issuer: signer,
audience: serverDid,
capability: {
can: 'employees/read',
with: 'myapp:company/acme',
nb: { limit: 25 },
},
proofs: [delegation],
});
// Serialize and send
const serialized = await serializeInvocation(invocation);
await fetch('/employees', {
method: 'POST',
body: JSON.stringify({ invocation: serialized }),
});Documentation
| Document | Description | | --------------------------------------------------------- | ---------------------------------------------------- | | Flow Diagram | Visual explanation of UCAN delegation and invocation | | Server Example | Complete Express server with protected routes | | Client Example | Frontend/client-side usage | | Capabilities Guide | How to define custom capabilities with caveats |
API Reference
Capability Definition
defineCapability(options: DefineCapabilityOptions)Define a capability with optional caveat validation.
| Option | Type | Description |
| ---------- | ---------- | -------------------------------------- |
| can | string | Action name (e.g., 'employees/read') |
| protocol | string | URI protocol (default: 'urn:') |
| nb | object | Schema for caveats using Schema.* |
| derives | function | Custom validation for attenuation |
Validator
createUCANValidator(options: CreateValidatorOptions): Promise<UCANValidator>Create a framework-agnostic validator.
| Option | Type | Description |
| ----------------- | ----------------- | ------------------------------------- |
| serverDid | string | Server's DID (any method supported) |
| rootIssuers | string[] | DIDs that can self-issue capabilities |
| didResolver | DIDKeyResolver | Resolver for non-did:key DIDs |
| invocationStore | InvocationStore | Custom store for replay protection |
Methods
| Method | Description |
| ----------------------------------------------------- | ------------------------------------------------------------- |
| validate(invocationBase64, capabilityDef, resource) | Validate an invocation against a capability definition |
| validateDelegation(delegationBase64) | Validate a standalone delegation (signature, audience, chain) |
validate() validates a full invocation — checks signature, capability matching, caveats, replay protection, and resource authorization.
validateDelegation() validates a standalone delegation token — verifies the cryptographic signature of every delegation in the proof chain, checks audience matches serverDid, validates expiration, and ensures chain consistency (each proof's audience matches the child delegation's issuer). Supports did:key issuers natively and non-did:key issuers (e.g. did:ixo) via the configured didResolver.
ValidateResult
Both methods return a ValidateResult:
| Field | Type | Description |
| ------------ | ---------------------------------------- | ---------------------------------------------------------------------------------------------------- |
| ok | boolean | Whether validation succeeded |
| invoker | string | DID of the invoker/issuer (on success) |
| capability | object | Validated capability with can, with, and optional nb caveats (on success) |
| expiration | number \| undefined | Effective expiration (Unix seconds) — the earliest across the delegation chain. Undefined = never. |
| proofChain | string[] \| undefined | Delegation path from root issuer to invoker, e.g. ["did:key:root", "did:key:alice", "did:key:bob"] |
| facts | Record<string, unknown>[] \| undefined | Facts attached to the invocation/delegation. Undefined if none. |
| error | object | Error with code and message (on failure) |
Error codes: INVALID_FORMAT, INVALID_SIGNATURE, UNAUTHORIZED, REPLAY, EXPIRED, CAVEAT_VIOLATION.
Client Helpers
| Function | Description |
| ------------------------------------ | --------------------------------- |
| generateKeypair() | Generate new Ed25519 keypair |
| parseSigner(privateKey, did?) | Parse private key into signer |
| signerFromMnemonic(mnemonic, did?) | Derive signer from BIP39 mnemonic |
| createDelegation(options) | Create a delegation |
| createInvocation(options) | Create an invocation |
| serializeDelegation(delegation) | Serialize to base64 CAR |
| serializeInvocation(invocation) | Serialize to base64 CAR |
| parseDelegation(serialized) | Parse from base64 CAR |
Note: Both
createDelegationandcreateInvocationdefault toexpiration: Infinity(never expires) when no expiration is specified. Pass an explicit Unix timestamp (seconds) to set an expiration.
Facts
Both createDelegation and createInvocation accept an optional facts parameter — an array of Record<string, unknown> objects representing verifiable claims or proofs of knowledge (UCAN spec §3.2.4).
const invocation = await createInvocation({
issuer: signer,
audience: serverDid,
capability: { can: 'oracle/call', with: 'ixo:oracle:123' },
proofs: [delegation],
facts: [{ requestId: 'abc-123', origin: 'portal' }],
});Important: Facts are scoped per-UCAN. Each delegation and invocation carries its own independent
fctfield. Facts on a delegation do not propagate to invocations that use it as a proof. Thefactsfield inValidateResultcontains only the facts from the invocation itself.
DID Resolution
createIxoDIDResolver(config: IxoDIDResolverConfig): DIDKeyResolver
createWebDIDResolver(config?: WebDIDResolverConfig): DIDKeyResolver
createLocalDIDResolver(): LocalDIDResolver
createCompositeDIDResolver(resolvers: DIDKeyResolver[]): DIDKeyResolvercreateIxoDIDResolver
Resolves did:ixo identifiers by querying the IXO blockchain indexer for verification keys.
| Option | Type | Description |
| ------------ | -------- | ------------------------------------------ |
| indexerUrl | string | Blocksync GraphQL endpoint for DID lookups |
createWebDIDResolver
Resolves did:web identifiers by fetching the DID document from https://{domain}/.well-known/did.json (or path-based equivalents) and extracting Ed25519 verification methods.
| Option | Type | Description |
| ---------------- | ---------- | ------------------------------------------------------------------------------------------ |
| fetch | function | Custom fetch implementation (default: globalThis.fetch) |
| fallbackToHttp | boolean | Retry with http:// when https:// fails (default: false). Localhost always uses HTTP. |
createLocalDIDResolver
Creates a DID resolver backed by an in-memory registry of pre-known keys. Useful for services that know their own did:web identity at startup and want to avoid network calls for self-resolution.
const localResolver = createLocalDIDResolver();
localResolver.register(
'did:web:myservice.example.com',
'z6MkPublicKeyMultibase...',
);
const didResolver = createCompositeDIDResolver([
localResolver, // check local first (instant)
createWebDIDResolver(), // fall back to HTTP
createIxoDIDResolver({ indexerUrl: '...' }),
]);| Method | Description |
| ----------------------------------- | ------------------------------------------------------ |
| register(did, publicKeyMultibase) | Register a DID with its z-base58btc Ed25519 public key |
createCompositeDIDResolver
Chains multiple resolvers. Tries each in order — returns the first successful result or the last error if all fail.
Replay Protection
new InMemoryInvocationStore(options?)
createInvocationStore(options?)DID Support
| DID Method | Support | Notes |
| ---------- | --------------- | -------------------------------------------------------- |
| did:key | ✅ Native | Parsed directly from the identifier |
| did:ixo | ✅ Via resolver | Resolved via IXO blockchain indexer |
| did:web | ✅ Via resolver | Fetches DID document from well-known endpoint |
| Local | ✅ In-memory | Pre-registered keys resolved instantly, no network calls |
Environment Variables
# For IXO DID resolution
BLOCKSYNC_GRAPHQL_URL=https://blocksync.ixo.earth/graphqlAdvanced Usage
Re-exported ucanto Packages
For advanced use cases, you can access the underlying ucanto packages:
import {
UcantoServer,
UcantoClient,
UcantoValidator,
UcantoPrincipal,
ed25519,
Verifier,
} from '@ixo/ucan';Custom Invocation Store
Implement the InvocationStore interface for distributed deployments:
interface InvocationStore {
has(cid: string): Promise<boolean>;
add(cid: string, ttlMs?: number): Promise<void>;
cleanup?(): Promise<void>;
}Testing
pnpm test # Run unit tests (vitest)
pnpm test:ucan # Run interactive test script with full UCAN flowThe unit tests cover proof chain construction, expiration computation, facts pass-through, validation failures, caveat enforcement, replay protection, and delegation validation (signature verification, audience checks, expiration, tampered signatures, proof chain consistency, and did:ixo support).
License
MIT
