- verify the request identity (
POST /v1/verify) - evaluate policy in runtime context (
POST /v1/check) - enforce
allow | challenge | deny
What your team gets
Runtime controls:- strong request verification (signature + timestamp + nonce)
- policy decisions right before execution
- optional disclosure controls and reputation facets
- workspace-scoped keys, quotas, and rate limits
- audit query/export for investigations and compliance
- credential minting and kill switch APIs for incident response
Integration model
- Agent signs request to your service.
- Your service verifies identity (
/v1/verifyor local verification). - Your service calls
/v1/check. - Your service enforces
allow | challenge | deny.