Developer Guides
Step-by-step tutorials for integrating cryptographic identity, policy enforcement, and verifiable telemetry into your applications.
Developer Guide
Welcome to the Kest Developer Guide. This section takes you from zero to a fully secured, policy-enforced, cryptographically audited microservice in Python.
Read guideGetting Started with Kest
This guide walks you through securing your first Python function with Kest — from installation to a fully working policy-enforced, cryptographically signed exec
Read guideSecuring Execution (Decorators)
The `@kest_verified` decorator is the primary entry point for securing any Python function with Kest. It orchestrates identity verification, trust evaluation, p
Read guideDistributed Context Propagation
For Kest's Merkle DAG lineage to survive across microservice boundaries, the cryptographic state (Passport and lineage root) must be extracted from outgoing req
Read guideCARTA Trust Model
Kest implements **Continuous Adaptive Risk and Trust Assessment (CARTA)** — a model where trust is not a static binary (authenticated/unauthenticated) but a **d
Read guideIdentity & Resource Context
Configure identity providers and pass user, agent, task, and resource attributes for fine-grained ABAC policy enforcement.
Read guideCryptographic Lineage Visualization
Understanding the non-fungible audit trail of a distributed request can be complex when looking at raw cryptographic hashes and signatures. Kest provides built-
Read guideTesting & Kest Lab
Kest provides a comprehensive testing strategy spanning unit tests with mocks to fully orchestrated integration tests in a Docker-based lab environment. This se
Read guideKest Lab: Zero Trust Integration Playground
A deep dive into the kest-lab showcase: Docker Compose architecture, SPIRE identities, OPA/Cedar policy sidecars, Keycloak, and the 17 integration tests that validate v0.3.0 compliance.
Read guide3-Hop Distributed Verification
This example demonstrates Kest's ability to maintain and verify cryptographic lineage across three distinct distributed services. This scenario was validated in
Read guideScope-Delegated Gateway: Full Zero Trust Delegation
A step-by-step walkthrough of the most complete Zero Trust delegation flow Kest supports: human → agent → gateway → task, with token contents, policy context, and signed audit entries shown at every hop.
Read guide