
Midnight Auth combines KERI-based self-sovereign credentials with Midnight's zero-knowledge blockchain — giving your users portable, self-sovereign identity without a single byte of PII on your servers.
Neither KERI credentials nor Midnight alone achieve trustless, portable, privacy-preserving auth. Together, they deliver something no competitor has.
Self-Sovereign Identity
Users own their credentials forever. KERI-based identifiers enable quantum-resistant key rotation and recovery — credentials survive device loss without any central data store.
Trustless On-Chain ZK Proofs
Verification happens on the Midnight blockchain — apps query the chain directly. You are never a trusted middleman. Apps trust cryptographic math, not your servers.
Near-Zero Verification Cost
Hold NIGHT tokens and generate DUST automatically. DUST pays for all blockchain verification transactions — turning a one-time asset purchase into unlimited verifications.
Midnight's dual-token model separates network value from operational cost. Hold NIGHT tokens — they automatically generate DUST, which pays for every on-chain verification. No per-transaction budget. No surprise gas spikes.

When a user authenticates, the ZK proof flows directly from their wallet to the Midnight chain. Apps read the result from the blockchain — not from you.
import NightProof from '@nightproof/sdk';
const auth = new NightProof({ apiKey: 'np_live_••••' });
// Generate a deep-link auth challenge
const { deepLink, sessionId } = await auth.initiateLogin();
window.open(deepLink); // opens NightProof wallet
// Wait for the user to verify (ZK proof on Midnight chain)
const session = await auth.waitForSession(sessionId);
console.log('Verified user AID:', session.sub);
// → No email. No phone. No PII. Just proof.Everything you need to ship production-grade decentralised auth without building infrastructure from scratch.
Flutter, JavaScript, and Go SDKs. Integrate in minutes, not weeks.
Users prove credential attributes without revealing underlying data. No central identity store.
KERI-based verification optimised for production-grade performance at any scale.
Monitor auth events, success rates, and usage patterns from your developer console.
Invite developers with role-based access controls from day one.
One API. Every platform — web, iOS, Android, and server-side.
On-chain audit trail with GDPR-compliant design. Commitment hashes, never PII.
At login time your server is not involved. Apps read proof results directly from the chain.
Why NightProof is different
We never store email, phone, or any PII. Only commitment hashes on the Midnight blockchain.
Apps verify credentials directly on-chain. We cannot lie, manipulate, or go offline to break auth.
NIGHT token generates DUST. Once purchased, verifications cost near zero — margins grow with volume.
No hidden fees. No per-user costs. Pay for what you verify.
Pro
Enterprise

Add Midnight-backed zero-knowledge authentication to your product in minutes.