- Is this request really from the claimed agent?
- Is this agent allowed to perform this action right now?
Auth quick reference
Request-time flow
Step 1: verify identity
- Option A (recommended): local Ed25519 verification
- Option B: online verification with
POST /v1/verify
Step 2: enforce policy
CallPOST /v1/check with agent_id, policy_id, action, and optional context.
allow, challenge, deny.
Control-plane flow
Agent inventory mapping
POST /v1/workspace/agents/upsertGET /v1/workspace/agents
Audit query and export
GET /v1/workspace/audit/eventsPOST /v1/workspace/audit/export
Short-lived credentials
POST /v1/identity/credentials/mintPOST /v1/identity/credentials/revokePOST /v1/identity/credentials/revoke-by-agent
Incident controls
POST /v1/identity/kill-switch/mintingPOST /v1/identity/kill-switch/revoke-allGET /v1/identity/kill-switch/status
Recommended architecture
- Edge layer verifies inbound agent signatures.
- Decision layer calls
/v1/checkright before execution. - Control-plane jobs sync inventory and export audits.
- Sensitive follow-on actions use short-lived credentials or Vault proxy.
- Security operations can pause minting/revoke quickly during incidents.