Cross-organization issuer keys, shared vocab crosswalks, common gateway boundaries. The mesh is the network effect.
Every action evaluated against fourteen constraint dimensions: identity, signature, scope, budget, rate, values, reputation, freshness, and six more. 37 + 10 conformance vectors. Missing a check is a deny.
You run hundreds or thousands of agents across teams. Each team has its own identity provider: Okta, Auth0, SPIFFE, Active Directory. You need a single governance layer that does not force a migration, that scales scoped delegation across the fleet, and that produces a unified audit surface without re-instrumenting every team's stack.
Identity adapters and governance modules are public. Module paths shown.
Bring your own identity. did:key, did:web, did:aps, SPIFFE SVID, OAuth. Five adapters shipped, signature round-trips verified across TS and Python. No identity migration required.
Charter and office governance. Multi-party approval for high-risk actions. Separation of powers across offices. Amendment rules, dissolution policy. The governance is constitutional, not procedural.
Hosted gateway with managed deployment. Mutual authentication handshake. Cascade revocation at fleet scale. Self-host or managed.
Cross-language byte-parity verified across the Wave 1 surface in 27 fixtures.
| Method | Surface | Auth | Typical use |
|---|---|---|---|
| did:key | Self-issued Ed25519 | Local keypair | Prototypes, single-team agents |
| did:web | Domain-rooted DID | TLS + .well-known | Org-hosted agents, public surface |
| did:aps | APS-native DID | Charter-bound, rotatable | Fleets under aeoess governance |
| SPIFFE | SVID workload identity | mTLS, short-lived | Service-mesh internal agents |
| OAuth | Bearer-token bridge | IdP redirect flow | Existing Okta, Auth0, AD setups |
Pick an identity adapter, write a charter, point your gateway at the policy module. Self-host or hosted.
Hosted enforcement edge, multi-region, fleet-scale revocation. Pricing on request.
[email protected] →