Integrator Configuration Guide
This guide explains how to model your platform in identity.app so your events become meaningful trust signals. It is written for people who are new to this system: first we cover concepts, then we cover how to configure each field.
As an integrator, you send events (example: completed job, dispute opened, spam report). Configuration is where you define how those events become trust signals.
- which signals exist,
- whether they are positive, negative, or neutral,
- how much each signal should matter,
- what anti-gaming guardrails should apply.
Concepts at a glance
Your product or platform.
Example: a marketplace app
A category of behavior inside your platform.
Example: payments, moderation, reliability
A single signal you emit in events.
Example: buyer confirms delivery and leaves a positive rating
A control to limit abuse or runaway scoring.
Example: count only the first 3 repeated actions in a 24h window
How configuration flows in practice
Pick your trust dimensions
Create 1-3 environments that map to how trust works in your product.
Define clear metrics
Add a small set of metrics in each environment. Start focused, not exhaustive.
Set local scoring behavior
Decide whether each metric is good, bad, or neutral for your platform, then assign conservative local weights.
Choose global reputation impact
For each metric, decide whether it should stay local or affect global identity.app reputation, since this can influence whether users choose to interact with your platform.
Apply policy rules
Add anti-gaming controls so repeated or coordinated behavior cannot dominate reputation.
Ship and iterate by version
Deploy, monitor outcomes, then publish a new version when you need to adjust scoring logic.
Worked example (marketplace)
- job_completed - positive signal that a task was finished.
- payment_dispute - negative signal that trust may be at risk.
- late_delivery - negative signal with moderate weight.
max_env_contribution so this one environment cannot dominate total reputation by itself.Field reference
Policy rules quick reference
Use when the same two actors can generate many repeated events. Repeated interactions get progressively less influence.
Use case: prevent score farming between two colluding accounts.
Use when one environment should not be able to dominate the entire trust profile.
Use case: cap the maximum influence of one area like payments or moderation.
Use when the same metric can arrive with low/medium/high severity and should scale differently by severity.
Use case: severe violations count much more than minor incidents.
Current limit: 1-3 policy rules per environment, with only one instance per rule type.
AI pre-generation vs manual setup
For integrators that already have environments, AI pre-generation creates one new environment draft at a time.
Versioning and rollout strategy
Environment IDs follow <slug>.<namespace>.v<n>.
- Upgrading creates a new version (for example
v1tov2) and marks the previous one deprecated. - Ingest accepts active and deprecated versions to support safe rollout.
- Recommended rollout: publish new version, update callers, monitor, then decommission old versions when ready.
Ingest identity conventions
Keep actor/subject identity formatting consistent before rollout so ingest validation and analytics stay predictable.
- If
actorTypeisagent, setactorIdto a valid DID. - If
actorTypeissystem, usesys:<integratorSlug>:<component>. Short formsys:<integratorSlug>is accepted and normalized to:main. - For agent-subject events, consent remains deny-by-default and consent grants require an existing agent profile for that DID.
Before you hit save
- Namespace format is valid and unique in form.
- At least one metric exists.
- Metric keys are unique and labels are non-empty.
- Weights are inside allowed ranges.
- Policy keys and numeric values are valid.
- Too many metrics before you validate signal quality.
- Ambiguous keys like
scoreorrank. - High default weights without observed production behavior.
- No policy rules for high-volume interactions.