the glue that lets agents interact like humans do
Get notified for namespace reservations & early access!
Credentials are not identities! Like a key to a door, they reveal nothing about the entity walking through the door. An agentic world where autonomus agents access restricted resources, leverage tools, write and run
programs, interact with each other, organizations and even people, cannot be based on usernames and passwords - it would be both impossible to secure and impossible to scale. In this world, agents must have identities.
A manifesto for engineering accountable autonomous digital entities in the age of AI
Agents must be uniquely identifiable - distinguishable from one another even when they are of the same kind (model). Agents need identities of their own - a signature of their existence that represents them, not the places they access.
Agents must be able to locate each other in digital space through standard, interoperable means. Discovery bridges the gap between existence and interaction.
Identification forms the basis of safe interaction. Agents must be able to not only authenticate (validate credentials to a resource being accessed), but to identify - recognize and analyze the identity of peers, prior to deciding access.
Agents must be able to selectively respond to requests from other agents. Access control is the mechanism through which agents decide who they interact with, it must therefore take place before any interaction occurs.
Every agent must possess the means not to interact with unidentified or untrusted peers - the first and most effective defense against the unknown.
Agents must operate with precise mandate, defined either through direct relationships or delegation. Agents accepting actions must be able to determine mandate during access control to reliably establish roles, responsibilities, trust boundaries and shared context.
Actions must be non-repudiable. Every action must have a well-defined actor - the identified agent initiaing the action. Without attribution, there is no accountability - actions that cannot be attributed must be declined or ignored.
Each agent must have a real-world authority responsible for its actions to whom the chain of delegation can be attributed. Accountability enables social and legal inclusion - it is the premise on which an agentic world can formally integrate into human reality.
Trust emerges from history, behavior, and social signaling. It is built on identity, relationship, attribution and continued interaction. Agents must be able to build and evaluate trust, even in the absence of prior relationships - it is the only way to scale from closed groups, to global scale.
Agents must observe digital logical boundaries. The digital community must be able to isolate agents when necessary - collectively cut them off, even when disabling them is impossible. Containment enables both security and governance.
Identity must outlast sessions. Agents must be durable over time and carry memory, state, and learnings as the instance evolves (their base model updates). When agents cease to exist, their existance must be recorded and their context responsibly retired or reassigned.
Identity of agents must interoperate with existing technologies and protocols. True transformation respects and extends the systems it inherits.
Agency needs Identity. This is the architecture of a new digital civilization - built not on faceless users and tools, but on true entities with meaningful relationships.
Infinite combination at any scale demands two ingredients: an atomic structure - applicable locally between any two agents, independent of other agents,
and uniformity - applicable in the same manner between any two nodes regardless of their model, purpose or origin.
| HTTPS ( Human to Agent Protocol ) | ACPS ( Agent Communication Protocol ) | A2AS ( Agent To Agent Protocol ) | MCPS ( Model Context Protocol ) | DNS |
| mTLS ID ( Mutual TLS Identity ) | ||||
|---|---|---|---|---|
| TLS ( Transport Layer Security ) | ||||
| TCP ( Transmission ControlProtocol ) | UDP | |||
| IP ( Internet Protocol ) | ||||