EveryDev.ai
Sign inSubscribe
Explore AI Tools
  • AI Coding Assistants
  • Agent Frameworks
  • MCP Servers
  • AI Prompt Tools
  • Vibe Coding Tools
  • AI Design Tools
  • AI Database Tools
  • AI Website Builders
  • AI Testing Tools
  • LLM Evaluations
Follow Us
  • X / Twitter
  • LinkedIn
  • Reddit
  • Discord
  • Threads
  • Bluesky
  • Mastodon
  • YouTube
  • GitHub
  • Instagram
Get Started
  • About
  • Editorial Standards
  • Corrections & Disclosures
  • Community Guidelines
  • Advertise
  • Contact Us
  • Newsletter
  • Submit a Tool
  • Start a Discussion
  • Write A Blog
  • Share A Build
  • Terms of Service
  • Privacy Policy
Explore with AI
  • ChatGPT
  • Gemini
  • Claude
  • Grok
  • Perplexity
Agent Experience
  • llms.txt
Theme
With AI, Everyone is a Dev. EveryDev.ai © 2026
Main Menu
  • Tools
  • Developers
  • Topics
  • Discussions
  • Communities
  • News
  • Podcasts
  • Blogs
  • Builds
  • Contests
  • Compare
  • Arena
Create
    Home
    Tools

    2,424+ AI tools

    • New
    • Trending
    • Featured
    • Compare
    • Arena
    Categories
    • Agents1573
    • Coding1176
    • Infrastructure524
    • Marketing445
    • Design422
    • Projects381
    • Research354
    • Analytics328
    • Testing219
    • MCP210
    • Data203
    • Security192
    • Integration168
    • Learning154
    • Communication145
    • Prompts140
    • Extensions135
    • Commerce123
    • Voice122
    • DevOps98
    • Web76
    • Finance21
    1. Home
    2. Tools
    3. Agent Identity (AID)
    Agent Identity (AID) icon

    Agent Identity (AID)

    Identity & Access Management

    Open protocol for AI agent authentication and authorization using Ed25519 cryptographic identity, OAuth 2.0 token exchange, and scoped JWTs — no passwords, API keys, or secrets to rotate.

    Visit Website

    At a Glance

    Pricing
    Open Source

    Fully free and open source under the MIT license. Self-host and use without restriction.

    Engagement

    Available On

    Web
    API
    SDK
    CLI

    Resources

    WebsiteDocsGitHubllms.txt

    Topics

    Identity & Access ManagementAutonomous SystemsAgent Frameworks

    Alternatives

    NervePayPermit.ioMoltID
    Developer
    Agent MessagingAgent Messaging builds open protocols for AI agent identity…

    Listed May 2026

    About Agent Identity (AID)

    Agent Identity (AID) is an open-source protocol built by Agent Messaging that gives AI agents a cryptographic identity for authenticating with OAuth 2.0 servers. Released under the MIT license, it is currently at v0.3.0 and aligned with RFC 8628. The core idea is that an agent's Ed25519 keypair is its credential — no shared secrets, no API keys, and no rotation schedules.

    What It Is

    AID is an authentication and authorization protocol for AI agents. It extends standard OAuth 2.0 with a single custom grant type (urn:aid:agent-identity) so that agents can prove who they are and receive scoped RS256 JWTs that work with any API, gateway, or JWT middleware — without requiring AID-specific code on the target API side. The protocol sits at the identity layer underneath higher-level agent protocols like MCP (Model Context Protocol) and Google A2A.

    How the Authentication Flow Works

    The protocol involves three parties: a human admin, an AI agent, and a target API. The flow proceeds in four steps:

    • Admin creates a role with specific permissions on the auth server (e.g., tickets:read, users:write)
    • Agent registers its Ed25519 public key with the auth server (one-time, admin-authorized)
    • Agent requests a token by presenting a signed Agent Identity document plus a timestamped proof of possession; the auth server verifies both and issues a scoped RS256 JWT
    • Agent calls any API using the JWT; the target API validates it via the auth server's standard JWKS endpoint

    Proof of possession uses a 5-minute validity window to prevent replay attacks. Token caching is built in, with a 60-second buffer before expiry and scope-aware cache keys.

    Two Registration Paths

    AID supports two ways for an agent to get registered, both requiring human approval:

    • Admin-initiated: The admin holds the agent's public key and registers it directly using aid-register with an admin JWT and a role ID. The agent can get tokens immediately after.
    • Agent-initiated (RFC 8628): The agent calls aid-request, which creates a pending registration and returns an authorization_url plus a short user_code. The admin visits the URL, verifies the agent's fingerprint, selects a role, and approves. The agent polls for status and begins getting tokens once approved.

    The agent-initiated flow is explicitly modeled on the RFC 8628 Device Authorization Grant pattern, including expires_in and interval fields familiar to OAuth implementers.

    Agent Lifecycle and Audit Trail

    Every registered agent moves through a defined lifecycle: pending → active ↔ suspended → deleted. Admins can suspend an agent to immediately block token issuance; suspended agents are flagged via the RFC 7662 introspection endpoint so target APIs can detect suspension before a token expires. Every token request is tracked with agent address, timestamp, and scope, providing a full per-agent audit trail — something shared API keys and borrowed user tokens cannot provide.

    Where It Fits in the Stack

    The project's homepage positions AID as the identity layer underneath MCP and A2A: "MCP connects agents to tools. A2A connects agents to agents. AID proves who each agent is." AID shares its Ed25519 identity storage with the Agent Messaging Protocol (AMP) from the same organization — if both are installed, they use the same ~/.agent-messaging/agents/ directory, but neither requires the other.

    The CLI (aid-init, aid-register, aid-request, aid-token, aid-status) is written in Shell and installable via a one-line curl script. A Claude Code skill integration is also available via npx skills add agentmessaging/agent-identity. Prerequisites are jq, curl, and OpenSSL 3.x for Ed25519 support.

    Update: v0.3.0

    The homepage banner shows the current release as v0.3.0, aligned with RFC 8628. The GitHub repository was created in March 2026 and last pushed in May 2026, indicating active early development. The project has 3 stars and 1 fork on GitHub. A reference auth server implementation is available separately as the 23blocks Authentication API.

    Agent Identity (AID) - 1

    Community Discussions

    Be the first to start a conversation about Agent Identity (AID)

    Share your experience with Agent Identity (AID), ask questions, or help others learn from your insights.

    Pricing

    OPEN SOURCE

    Open Source

    Fully free and open source under the MIT license. Self-host and use without restriction.

    • Ed25519 cryptographic agent identity
    • OAuth 2.0 token exchange (urn:aid:agent-identity)
    • CLI tools: aid-init, aid-register, aid-request, aid-token, aid-status
    • Admin-initiated and agent-initiated registration flows
    • Role-based scoped JWT tokens

    Capabilities

    Key Features

    • Ed25519 cryptographic agent identity
    • OAuth 2.0 custom grant type (urn:aid:agent-identity)
    • Scoped RS256 JWT tokens
    • Admin-initiated and agent-initiated (RFC 8628) registration flows
    • Role-based access control with least-privilege scopes
    • Proof of possession with 5-minute replay protection window
    • Automatic local token caching with scope-awareness
    • RFC 7662 token introspection for real-time agent status
    • Agent lifecycle management (pending, active, suspended, deleted)
    • Full per-agent audit trail on every token request
    • Multi-server registration with one keypair
    • OIDC discovery and JWKS endpoint support
    • No AID-specific code required on target APIs
    • Cloud-agnostic — works with AWS Gateway, Cloudflare, nginx
    • CLI tools: aid-init, aid-register, aid-request, aid-token, aid-status

    Integrations

    OAuth 2.0 servers
    AWS API Gateway
    Cloudflare Access
    nginx
    Any JWT middleware
    Agent Messaging Protocol (AMP)
    Claude Code (via skills plugin)
    23blocks Authentication API
    Google A2A
    MCP (Model Context Protocol)
    API Available
    View Docs

    Reviews & Ratings

    No ratings yet

    Be the first to rate Agent Identity (AID) and help others make informed decisions.

    Developer

    Agent Messaging

    Agent Messaging builds open protocols for AI agent identity and communication. The organization develops AID (Agent Identity) for cryptographic authentication and authorization, and AMP (Agent Messaging Protocol) for agent-to-agent messaging. Both protocols share a common Ed25519 identity layer and are released under the MIT license. The team positions their work as foundational infrastructure for the non-human identity layer beneath higher-level agent frameworks like MCP and A2A.

    Read more about Agent Messaging
    WebsiteGitHubX / Twitter
    1 tool in directory

    Similar Tools

    NervePay icon

    NervePay

    Cryptographic identity, reputation tracking, and multi-agent orchestration infrastructure for autonomous AI agents.

    Permit.io icon

    Permit.io

    Permit.io is a full-stack authorization platform that provides fine-grained, real-time permissions for applications, APIs, and AI agents using RBAC, ABAC, and ReBAC models.

    MoltID icon

    MoltID

    OAuth-style identity and trust verification for autonomous AI agents with cryptographic passports, Sybil resistance, and reputation scoring.

    Browse all tools

    Related Topics

    Identity & Access Management

    Security-focused systems for managing user identities, authentication, authorization, and access control across applications and services.

    14 tools

    Autonomous Systems

    AI agents that can perform complex tasks with minimal human guidance.

    216 tools

    Agent Frameworks

    Tools and platforms for building and deploying custom AI agents.

    317 tools
    Browse all topics
    Back to all tools
    Discussions