The document introduces Decentralized Identifier (DID) authentication and its significance in verifying identity in self-sovereign identity (SSI) systems. It discusses the architecture, challenge-response mechanisms, and various formats such as JWT and verifiable credentials, emphasizing the importance of proving control over DIDs. Additionally, it explores the relationship between DID auth, biometrics, existing authentication protocols, and the associated security and privacy considerations.