Skip to content

Standards Positioning

Universal Manifest is built on established standards and designed to complement — not replace — existing identity, credential, and data portability efforts. This page explains what UM builds on, how it relates to adjacent standards, and what its relationship is with relevant standards bodies.

Every foundational dependency was chosen for broad adoption, proven interoperability, and availability across programming languages and platforms.

StandardSourceUM Usage
JSON-LD 1.1W3C RecommendationDocument structure, vocabulary definition, semantic interoperability
Decentralized Identifiers (DIDs) v1.0W3C RecommendationSubject identifier format (recommended, not required)
Verifiable Credentials Data Model v2.0W3C RecommendationClaims within shards can be structured as VCs
JSON Canonicalization Scheme (RFC 8785)IETFCanonicalization in v0.2 signing/verification
Ed25519 (RFC 8032)IETFSignature algorithm in v0.2 signature profile
Well-Known URIs (RFC 8615)IETFService discovery in the reference runtime lane
JSON Schema Draft 2020-12IETF / OpenJS FoundationStructural validation of manifest documents

UM is a portable state document format. It is not a credential format, not a messaging protocol, not a storage system, and not an authentication mechanism.

VCs are individual claims issued by an authority. UM is a container that can carry VCs as claims within shards. VCs are stamps in a passport; UM is the passport itself.

DIDComm is a messaging protocol for DID-based systems. UM is a document format. A DIDComm message could carry a UM manifest as its payload. They operate at different layers.

Solid provides decentralized data storage. UM manifests use pointers to reference data stored in Solid Pods. Solid provides the authoritative store; UM provides the portable, time-bounded projection.

OIDC carries authentication state. UM carries a broader set of portable state: identity, credentials, preferences, consent, and device registrations. A UM manifest might include a claim derived from an OIDC flow, but it serves a different architectural purpose.

Federation protocols for social networking. UM can carry pointers to ActivityPub actors and AT Protocol identities. The social integration lane demonstrates how a single manifest drives profile projections across federated social surfaces.

W3C Data Integrity provides RDF-level signing. UM v0.2 uses JCS + Ed25519 (JSON-level) as the pragmatic first profile. A Data Integrity profile is a planned future additive option.

Relationship: Historical lineage. UM is descended from the Metaverse Universal Manifest (MUM) concept, created in an MSF working group. The MUM scope was metaverse cross-world identity; UM broadens this to a cross-domain standard. There is no active formal organizational relationship. The metaverse remains a first-class integration lane.

Relationship: Active integration lane. OMATrust is the most extensively developed standards-adjacent integration in the project, with a formal assessment, dedicated fixtures, and published integration documentation. OMA3 is the consortium context; OMATrust is the product/lane context.

Relationship: Standards consumer. UM builds on JSON-LD, DIDs, and VCs. There is no formal W3C engagement. Future W3C working group participation is a possibility after broader adoption.

Relationship: Standards consumer. UM builds on RFC 8785 (JCS), RFC 8032 (Ed25519), and RFC 8615 (.well-known). There are no plans for IETF submission.

Relationship: Documentation quality benchmark and organizational model influence. The domain architecture (separating spec governance from runtime resolution) follows the Linux Foundation model. If UM pursues foundation-hosted governance, the Linux Foundation ecosystem is a natural fit.

Universal Manifest is currently an independent open-source specification under the Apache-2.0 license. It is not submitted to, hosted by, or governed by any formal standards body.

The decision on whether to pursue formal standardization has not been made. Prerequisites include multiple independent implementations, a stable v0.2 signature profile, a standalone conformance test suite, and external adoption evidence.

Adopters do not need to wait for formal standardization. The specification is public, schemas are published at stable URLs, conformance requirements are documented, and the license permits unrestricted use.

BodyRelationshipStatusFuture
MSFHistorical lineageNo active relationship; MUM origin acknowledgedOpen to contributing back
OMA3 / OMATrustActive integration laneAssessed, documented, fixtures completeDeepen as OMATrust matures
W3CStandards consumerBuilding on JSON-LD, DIDs, VCsPossible future engagement
IETFStandards consumerBuilding on RFC 8785, 8032, 8615No plans for submission
Linux FoundationModel influenceDocumentation benchmarkNatural fit if hosted governance pursued