IAM Blueprint: The Allegory of Power
I. The Spirit of Sovereignty
Identity in the Singular Dream platform is not a static database record; it is a polymorphic state determined by the intersection of identity, role, and environment. We move beyond standard RBAC into a model of Sovereign Identity Aggregation, where a single logon identity can manifest different levels of power across the system.
II. The Sovereignty Model (The Three Tiers of Being)
1. The Arquetipo (Total Dominion / GOD)
The Arquetipo exists above the system graph. Their power is self-evident and absolute.
- Allegory: "The Eye that sees the whole."
- Identity Access Mapping: Root/Superuser with
TOTAL_DOMINION. - The Hard Gate: Access is locked to a transcendental whitelist of Logon IDs (transcending the database).
- Capabilities: Omniscient visibility (read-all), direct state manipulation (write-all), and zero-latency override.
- Audit Requirement: Every observation and action of the Arquetipo is forensically captured in the Akashic Records—the system's permanent digital ledger—ensuring that divine power is always witnessed with total transparency.
2. The Demi-God (The Intermediary / Privileged)
Identities authorized to bridge the gap between divine system power and mortal limitation.
- Allegory: "The Architect/Tester who walks among mortals."
- Identity Access Mapping: Service/Support Personnel or System Administrators.
- Primary Capability: Mortal Mimicry (Impersonation). The ability to swap their "Principal ID" for any other identity in the system to troubleshoot or validate mortal experiences.
- The Environmental Constraint: These powers are strictly environment-locked (
NODE_ENV !== production).
3. The Mortal (The Citizen / Resident)
The standard unit of existence. A mortal's power is derived from the Aggregation of Personas.
- Allegory: "The citizen defined by their relationships."
- Identity Access Mapping: Standard Multi-Role User.
- Capabilities: Dynamically calculated by the Privilege Registry based on the "Personas" (Owner, Staff, Resident) attached to their profile.
III. The Mechanics of Access (The Three Axes of Authority)
Every request in the system is evaluated against a 3-dimensional coordinate:
- The Axis of Hat (The "Why"): The specific Persona currently active (e.g., "I am acting as a BOARD MEMBER").
- The Axis of Principal (The "Who"): The Identity being represented. Usually "Self", but can be another user when a Demi-God uses "Mimicry".
- The Axis of Asset (The "What"): The Scope of the action (e.g., "I am touching Unit 304").
IV. The Engines of Truth (Infrastructure)
1. The Privilege Registry (The System's Memory)
An in-memory, high-speed graph that stores the aggregated capabilities of all mortal identities. It eliminates the need for expensive recursive database lookups during active sessions.
- Initialization: Hydrated at system BIOS (Instrumentation).
- Invalidation: Reacts to changes in unit ownership or staff assignments.
2. The Graph Resolver (The Pulse)
The authoritative server-side function (resolveAuthzSnapshot) that determines the "Authz Snapshot" for every session.
- The Divine Bypass: Detects Arquetipo IDs and grants infinite permissions instantly.
- The Recursive Walk: For mortals, it traverses the Persona graph to consolidate capabilities into a single bitmask/object.
V. Forensic Accountability (The Akashic Records)
Power in the system is absolute, and therefore must be witnessed. The Akashic Records serve as the Permanent Ledger of Acts—an immutable digital scripture that records three levels of engagement:
- Observation: Every instance where the Arquetipo or a Demi-God views mortal data or system-root nodes.
- Intervention: Every privileged action, write operation, or identity assumption (Impersonation).
- Critical: System-level overrides or security bypasses that transcend standard protocols.
VI. The User Lifecycle (The Veil & Liminal States)
Access to the Singular Dream is not a binary toggle, but a journey through The Veil.
1. The Liminal State
Upon the initial submission of an access request, an identity is instantly catalyzed. This identity exists in the Liminal State—granted passage beyond the firewall to witness the "Learning Aspects" of the system and track the heartbeat of their own progression, yet denied any interaction with the mortal world.
2. The Watchlist (The Shadow Records)
Rejection is not merely a denial; it is an entry into the Shadow Records.
- Forensic Context: Every rejection records a specific reason, binding the identity to a Watchlist.
- Evaluation Intelligence: Subsequent attempts at crossing The Veil are automatically cross-referenced against this shadow history, allowing the system to monitor patterns of intent and factor past interactions into future evaluation.
VII. Natural Law (Event-Driven Sovereignty)
The system does not require manual "Access Expansion Requests." It operates on the principle of Natural Law, where access is a side-effect of Event-Based Maintenance.
- Passive Provisioning: When a transaction is recorded in the "Memory of the System" (e.g., a Unit Sale, a Lease signing, or an Employment Contract), the Privilege Registry detects the shift in the fabric of the community and automatically grants the appropriate level of sovereignty.
- Passive Revocation: Just as access is born of an event, it dies with one. The expiration of a lease or the closure of a contract triggers an immediate, passive recalculation of caps, returning the identity to its baseline state without human intervention.
VIII. The Pragmatic Reality: User Experience & Admin Savings
Beyond the allegory, this model delivers a revolutionary change in how a community is managed on a daily basis.
1. The "Zero-Admin" User Experience
For the end-user, the system feels intuitive and intelligent.
- No Waiting: A new owner doesn't wait for an invite link or an admin to "enable" their account. The moment the deed is recorded, the system recognizes them.
- No Confusion: The user doesn't see buttons they can't click. The interface is a reflection of their current sovereignty.
- Self-Service Transparency: Requesters can log in instantly to see exactly where they stand in the queue, removing the "black box" frustration of traditional application processes.
2. Total Administrative Relief
For the community manager, the "Admin Burden" is effectively deleted.
- No More "Access Reset" Tickets: Access is tied to the contract. If the contract is valid, they have access. If it's not, they don't.
- Automated Lifecycle: 90% of account creation, role upgrades, and de-provisioning are handled by system triggers rather than human data entry.
- Forensic Peace of Mind: Managers no longer need to "audit" permissions manually. The Akashic Records provide an automated, immutable log of who touched what and why, ready for board review at any moment.
IX. Conclusion: The Architecture of Natural Law
The "Allegory of Power" is more than a creative framework; it is a fundamental shift from Permissive Administration to Intrinsic Sovereignty. Traditionally, Identity & Access Management (IAM) is a burden of constant manual intervention—a binary list of permissions that requires an administrator to grant, audit, and revoke. This traditional model is brittle, prone to human error, and creates an administrative bottleneck that scales poorly.
Why This Model is Superior:
- The Modeling of the Universe: By bifurcating the system into the Divine Realm (immutable, ID-locked root) and the Earthly Realm (the shifting graph of community relationships), we have mapped the platform to the physical laws of a functioning society.
- Self-Governing & Self-Healing: Because the Privilege Registry is a reactive engine, the system "heals" its own access boundaries in real-time. When a contract expires in the physical world and is recorded in our database, the access "dies" naturally. There is no "stale access" because access is not a property of the user—it is a side-effect of their current alignment with the system's events.
- Minimal Administrative Burden: We have achieved the Death of the Administrator. By automating the "Natural Law" of provisioning and revocation through event-based triggers, we remove the need for tickets, requests, and manual "Access Expansion." The system maintains itself through the simple act of keeping the community records accurate.
- Active Transparency (The Akashic records): Superior security is not found in hidden rules, but in total visibility. By logging every divine observation into the Akashic Records, we create a system of "Witnessed Sovereignty" where even the most powerful actors operate within a transparent, immutable scripture.
Final Evaluation:
We have modeled the universe and the physical laws that govern it. We have automated the earthly realm so that sovereignty is earned through action and relationship rather than administrative decree. The result is a system that is not only "Self-Healing" but fundamentally Sovereign—capable of maintaining its own integrity through the natural pulse of community life.
This blueprint establishes the bridge between the high-level allegory of sovereignty and the technical implementation of Identity & Access Management in Singular Dream.
Version History
| Version | Date | Author | Change |
|---|---|---|---|
| 0.1.0 | 2026-01-29 | Antigravity | Initial Audit & Metadata Injection |