The words the protocol uses.
Entity types, action types, decision codes, reason codes, capability kinds, side-effect levels, data classes, signal types, redaction fields, taxonomies, graph types — the vocabulary every conformant implementation reads from. The canonical machine-readable source lives at github.com/KYE-Protocol/vocabulary; this page is the human-readable index.
What KYE™ recognises as an entity.
Every URN starts with one of these classes — kye:<class>:<trust-domain>:<subclass>:<local>.
human— natural person; KYC-verifiedorg— legal entity / business; KYB-verifiedagent— AI agent (LLM-backed, autonomous, supervised, etc.)service— software service / workload (SPIFFE-equivalent)model— foundation / fine-tuned modeltool— capability instance (MCP tool, function, connector, playbook, model_profile)workflow— orchestrated sequence of actionscapability— named capability declarationcredential— verifiable credential / attestation / keyresource— wallet / dataset / document / vehicle / vessel / shipmentworkload— attested runtime instancepayload— signed evidence artefact
What KYE™ sees an entity do.
read/write/execute— baseline data + capability operationsdelegate/attenuate/revoke— authority lifecycleauthorize/attest/vouch— decision-producing operationspayment/transfer/trade— money-rail operations (Payments + Treasury profiles)redact/tombstone/recover— data-lifecycle operationsquarantine/break_glass/cascade— incident-response operations
Sector profiles add domain-specific actions (e.g. Healthcare adds consent, disclose; Custody adds co_sign, recover_key).
The eight ways KYE™ answers an authorize call.
allow— unconditional permissionallow_with_constraints— permission subject to obligations the caller must honour (e.g. redaction, rate-limit, dual approval)require_approval— dual-control / human-in-the-loop step required before the action proceedsrequire_step_up— additional credential (re-authn, MFA, attested workload) requiredrequire_human_review— explicit human review (used by EU AI Act high-risk workflows)require_recovery— recovery / break-glass flow required (compromised state)quarantine— entity placed in restricted state pending investigation; partial operations may continuedeny— refused; the audit chain records the reason code
Why the runtime decided what it decided.
Reason codes are namespaced. Every decision carries at least one. Examples:
authority.delegation_chain_invalid— the chain back to a human / business is brokenscope.amount_exceeds_cap— the action is within scope type but exceeds the value limitstate.entity_quarantined— the actor is in a quarantine statestate.credential_expired— the credential carrying the action’s justification has lapsedobligation.redaction_required— the action proceeds with a redaction obligation attachedpolicy.deny_by_default— no matching allow rulerecovery.break_glass_required— the operation needs the break-glass workflow
Full canonical list: github.com/KYE-Protocol/vocabulary/reason-codes.md (~120 codes).
The rest of the canonical word-list.
- Capability kinds —
skill,tool,mcp_tool,function,connector,playbook,model_profile,payment_action. - Side-effect levels —
none,read,write,money,physical,irreversible. - Data classes —
public,internal,confidential,pii,phi,pci,restricted. - Signal types —
stop,pause,quarantine,cascade_revoke,step_up_required,attestation_invalidated. - Redaction fields —
pii.redacted,phi.redacted,credential.redacted,payload.redacted. - Taxonomies — 16 V1 canonical taxonomies covering entity_type, capability_type, action_type, resource_type, data_class, side_effect_level, risk_state, environment, decision, reason_code, evidence_type, compliance_framework, sector, jurisdiction, plus state taxonomies.
- Graph types — Authority Graph™ (entity / authority / delegation / scope / capability / state / decision / evidence nodes; typed edges between them).
All vocabularies ship as Apache 2.0 markdown + JSON Schemas in github.com/KYE-Protocol/vocabulary. New entries follow the v1.x process documented in the whitepaper §9 Governance.