Introduction
VCVerifier is configured via YAML configuration files. The configuration covers server settings, verifier behavior, logging, and credential trust configuration.Configuration File Location
The configuration file is loaded from one of the following locations:Configuration Structure
The configuration file is organized into the following main sections:Server
HTTP server configuration including port, templates, and static files
Verifier
Core verifier functionality: DID, keys, validation modes, and session settings
Credentials Config
Trust anchors, scopes, and credential type configuration
Templating
Customize the login page and QR code presentation
Minimal Configuration Example
Here’s a minimal configuration to get started:Environment Variables
Path to the configuration YAML file. Defaults to
./server.yamlConfiguration Validation
The configuration is validated at startup. If any required fields are missing or invalid, VCVerifier will fail to start with a descriptive error message.
Dynamic vs Static Configuration
VCVerifier supports two modes of configuration:Static Configuration
Static Configuration
All service and credential configurations are defined directly in the YAML file under
configRepo.services. This is suitable for simple deployments with fixed trust relationships.Dynamic Configuration
Dynamic Configuration
Configure
configRepo.configEndpoint to point to a Credentials Config Service. The verifier will periodically fetch updated configurations, allowing runtime changes without restart.Next Steps
Server Configuration
Configure HTTP server, templates, and logging
Verifier Configuration
Set up DIDs, keys, and validation modes