Kest LogoKest
Get Started
Portal/Guide/Developer Guide

Developer Guide

Welcome to the Kest Developer Guide. This section takes you from zero to a fully secured, policy-enforced, cryptographically audited microservice in Python.

Learning Path

StepArticleWhat You'll Learn
1Getting StartedInstallation, configuration, your first @kest_verified function
2Decorators ReferenceEvery @kest_verified parameter, the 13-step lifecycle
3Distributed PropagationMiddleware stack, KestMiddleware, KestHttpxInterceptor, Claim Check
4Trust ModelCARTA trust scores, degradation, sanitizers, ORIGIN_TRUST_MAP
5Identity & ContextIdentity providers, user/agent/task context, auto-detection
6Telemetry & VisualizationOTel setup, exporters, kest-viz CLI
7Testing & Kest LabMockPolicyEngine, unit tests, the kest-lab integration environment
8Kest Lab Deep DiveDocker Compose architecture, SPIRE, OPA, Cedar, Keycloak, 17 integration tests
93-Hop Distributed VerificationExample: Verifying cryptographic lineage across three distinct distributed services
10Scope-Delegated Gateway E2EExample: Full Zero Trust delegation flow with token contents and policy context

Prerequisites

  • Python 3.11+ (the reference implementation)
  • pip or uv for package management
  • Docker & Docker Compose (for kest-lab integration tests)
  • Basic familiarity with REST APIs and microservices

Architecture at a Glance

diagram
Rendering diagram…

Quick Start

python
from kest.core import configure, MockPolicyEngine, kest_verified
 
# 1. Configure (once at startup)
configure(engine=MockPolicyEngine(allow=True))
 
# 2. Protect your function
@kest_verified(policy="kest/allow_trusted", source_type="internal")
def process_data(payload: dict):
    return {"status": "processed", "items": len(payload)}
 
# 3. Call it normally
result = process_data({"key": "value"})

That's it. Kest handles identity, signing, policy evaluation, Merkle chain linkage, and OTel emission automatically.


Ready to begin? Start with Getting Started.