⚠️ IMPLEMENTATION STATUS
These guides describe the target deployment experience for Credence. While the core services exist in the codebase, the Docker containers, CI/CD pipelines, installers, and some SDKs described here are not yet implemented. Download links and some deployment scripts represent the target state. This documentation serves as a specification for DevOps implementation.
Welcome to the Credence ecosystem! Choose your path based on your role and needs:
Just want to use Credence? Download the desktop wallet and start building your decentralized identity.
Perfect for:
No technical setup required - just download and go!
Want to help the network? Run a light node to participate in P2P gossip and data availability.
Perfect for:
Requirements: Basic VPS, 4GB RAM, Docker knowledge
Serious about infrastructure? Run a complete node with all Credence services for maximum rewards.
Perfect for:
Requirements: Dedicated server, 16GB+ RAM, professional deployment
Need to issue credentials? Set up issuer services for your institution, company, or organization.
Perfect for:
Custom solutions for credential issuance, verification, and management.
Building applications? Integrate Credence into your existing systems and applications.
Perfect for:
Comprehensive SDKs for JavaScript, Go, Python, and more.
Your Role | Time to Setup | Technical Level | Guide | Commands |
---|---|---|---|---|
End User | 5 minutes | None | Wallet Guide | Commands |
Light Node Operator | 30 minutes | Basic | Light Node | Commands |
Full Node Operator | 2-4 hours | Advanced | Full Node | Commands |
Credential Issuer | 1-2 hours | Intermediate | Service Provider | Commands |
App Developer | 30 minutes | Programming | Developer Guide | Commands |
→ See DEPLOYMENT.md for ready-to-run commands for all scenarios
graph TB
subgraph "End Users"
W[Desktop Wallets]
M[Mobile Apps]
B[Web Apps]
end
subgraph "Service Providers"
U[Universities]
E[Employers]
G[Government]
H[Healthcare]
end
subgraph "Network Infrastructure"
L[Light Nodes]
F[Full Nodes]
S[Seed Nodes]
end
subgraph "Credence P2P Network"
P[Gossip Protocol]
D[DHT Discovery]
C[Consensus Layer]
T[Trust Scoring]
end
W --> P
M --> P
B --> P
U --> P
E --> P
G --> P
H --> P
L --> P
F --> P
S --> P
P --> D
P --> C
P --> T
All deployment patterns prioritize:
The more participants in each role, the stronger the network becomes:
Ready to get started? Pick your guide above and dive in! 🌊