Allow all applicable XID operations
Operational: Authenticate as the subject (e.g., log into services)
Operational: Sign digital communications as the subject
Operational: Encrypt messages from the subject
Operational: Elide data under the subject's control
Operational: Issue or revoke verifiable credentials on the subject's authority
Operational: Access resources under the subject's control
Management: Delegate privileges to third parties
Management: Verify (update) the XID document
Management: Update service endpoints
Management: Remove the inception key from the XID document
Management: Add or remove other verifiers (rotate keys)
Management: Transition to a new provenance mark chain
Management: Revoke the XID entirely
CLI-level privilege options for XID operations.