Allow all applicable XID operations
Authenticate as the subject (e.g., log into services)
Sign digital communications as the subject
Encrypt messages from the subject
Elide data under the subject's control
Issue or revoke verifiable credentials on the subject's authority
Access resources under the subject's control
Delegate privileges to third parties
Verify (update) the XID document
Update service endpoints
Remove the inception key from the XID document
Add or remove other verifiers (rotate keys)
Transition to a new provenance mark chain
Revoke the XID entirely
Enum representing XID privileges.