Federation in SADAR is the operational mechanism by which registries enter into bilateral relationships permitting cross-registry discovery and content replication. Federation is bilateral, non-transitive, admin-driven, and authorization-validated. This page introduces the federation architecture: how registries discover candidates through the Directory of Authorized Registries, evaluate compatibility, enter into bilateral agreements, and administer per-registry policy. The full treatment lives in the linked SADAR Federation Establishment and Policy document.
Cross-mode federation produces a clean directed-graph property: content flows from authorized to non-authorized; non-authorized registries cannot inject content back into the public federation. The asymmetry preserves the institutional-trust path while allowing private deployments to participate as consumers without taking on the certification burden. The federation assertion captures the directional roles explicitly.
The Directory of Authorized Registries is the canonical Registry of Registries for the SADAR public federation, operated by OpenSemantics.org. It lists authorized registries and serves as the institutional-trust signal admins rely on. The Directory replicates across multiple operational instances for high availability — registries configure primary, secondary, and tertiary RoRs much as DNS clients configure name servers. Inter-RoR replication uses the standard SADAR registry federation contract; the recursive architectural pattern holds at this layer as it does at the registry layer.
A registry admin seeking to establish federation typically begins from the Directory: looking up a known partner or automated match dimensions.
Federation requires bilateral agreement. Both parties evaluate each other; both sign federation assertions in their own names; the assertions are exchanged through the standard SADAR push channel. The assertion captures the directional roles, the federation scope, the TTL, and the push endpoints.
Registries SHOULD implement ACLs determining inbound and outbound rules per federated registry, including per-entry, per-entity, and per-manifest-criteria rules. Block lists for specific home registries support operational issues, voluntary exclusion, and pre-deauthorization isolation. Requester-specific blocking is handled at the IAM layer rather than the federation layer, separating federation membership from principal-level permissions.
SADAR Federation Establishment and Policy — the full normative draft. Covers the four architectural principles in detail, the eligibility-by-operational-mode treatment with the directional asymmetry, the Directory and RoR architecture with descriptor schema, the federation establishment protocol, NFR-dominated federation compatibility matching, the three-layer admin policy architecture, the federation lifecycle, and the complete normative requirements (R-FED,R-ELIG, R-EST, R-ROR, R-MATCH, R-POL).
SADAR Governance and Conformance — the conformance / certification /authorization ladder that produces authorized registries;
SADAR Replication and Manifest Provenance — the cryptographic mechanics of replication and the push channel that lifecycle messages flow through;
Registry of Registries — the federation-layer component that resolves cross-registry discovery;
8. NFR Schema — the canonical source for NFR categories andthe bilateral match algorithm.