Kest LogoKest
Get Started
Portal/Guides

Developer Guides

Step-by-step tutorials for integrating cryptographic identity, policy enforcement, and verifiable telemetry into your applications.

Developer Guide

Welcome to the Kest Developer Guide. This section takes you from zero to a fully secured, policy-enforced, cryptographically audited microservice in Python.

Read guide

Getting Started with Kest

This guide walks you through securing your first Python function with Kest — from installation to a fully working policy-enforced, cryptographically signed exec

Read guide

Securing Execution (Decorators)

The `@kest_verified` decorator is the primary entry point for securing any Python function with Kest. It orchestrates identity verification, trust evaluation, p

Read guide

Distributed Context Propagation

For Kest's Merkle DAG lineage to survive across microservice boundaries, the cryptographic state (Passport and lineage root) must be extracted from outgoing req

Read guide

CARTA Trust Model

Kest implements **Continuous Adaptive Risk and Trust Assessment (CARTA)** — a model where trust is not a static binary (authenticated/unauthenticated) but a **d

Read guide

Identity & Resource Context

Configure identity providers and pass user, agent, task, and resource attributes for fine-grained ABAC policy enforcement.

Read guide

Cryptographic Lineage Visualization

Understanding the non-fungible audit trail of a distributed request can be complex when looking at raw cryptographic hashes and signatures. Kest provides built-

Read guide

Testing & Kest Lab

Kest provides a comprehensive testing strategy spanning unit tests with mocks to fully orchestrated integration tests in a Docker-based lab environment. This se

Read guide

Kest Lab: Zero Trust Integration Playground

A deep dive into the kest-lab showcase: Docker Compose architecture, SPIRE identities, OPA/Cedar policy sidecars, Keycloak, and the 17 integration tests that validate v0.3.0 compliance.

Read guide

3-Hop Distributed Verification

This example demonstrates Kest's ability to maintain and verify cryptographic lineage across three distinct distributed services. This scenario was validated in

Read guide

Scope-Delegated Gateway: Full Zero Trust Delegation

A step-by-step walkthrough of the most complete Zero Trust delegation flow Kest supports: human → agent → gateway → task, with token contents, policy context, and signed audit entries shown at every hop.

Read guide