AIP is being proposed to the IETF as a universal standard for identity in the Internet of Agents (IoA) — so that anyone, anywhere, can build secure agents with full visibility and confidence.
The God Mode Problem
Today, agents are granted full permissions to API keys, secrets, and system resources, running as the user with no distinction between human and non-human actions. As the line between what a human and an autonomous agent does becomes increasingly blurred, this creates serious risks — not just at a security level, but at a legal, societal, and economic level.Agents Have No Identity Layer
There is no universal way to distinguish an AI agent from a human actor. When you connect Claude, Cursor, or any MCP-compatible agent to your systems, it receives god mode — full access to every tool the server exposes, with the same credentials as the user. Model safety isn’t enough. Attacks like Indirect Prompt Injection — demonstrated by the GeminiJack vulnerability — have proven that adversarial instructions embedded in documents, emails, or data can hijack agent behavior. The model believes it’s following your intent while executing an attacker’s commands. Beyond security, agents operating without identity creates systemic gaps:- No audit trail — actions taken by agents are indistinguishable from human actions in logs
- No revocation — once an agent has credentials, there is no standard way to revoke them
- No authorization granularity — access is all-or-nothing at the API key level
- Compliance blind spots — SOC 2, GDPR, HIPAA, and SOX requirements are unmet for agentic actions
“Authentication is for Users. AIP is for Agents.”
How AIP Works
AIP is built on two layers that work together. Layer 1 establishes who the agent is. Layer 2 decides what it’s allowed to do. The Agent Authentication Token (AAT) is the bridge. It’s issued by Layer 1, enforced by Layer 2. The current Go implementation of AIP introduces policy-based authorization at the tool-call layer—the missing security primitive between your agents and your infrastructure.Two-Layer Architecture
- A hijacked agent fails at Layer 2 — its AAT claims don’t match the attempted action
- A revoked agent fails at Layer 2 — the proxy checks the registry revocation list on every call
- A legitimate agent passes through both layers with a full audit trail tied to its identity
Key Features
Per-Agent Identity
Cryptographic identities tied to each agent, not just user-level credentials
Policy-Based Authorization
Fine-grained control at the tool-call and argument level with YAML policies
Defense Against Prompt Injection
Blocks unauthorized actions even when the model is hijacked
Immutable Audit Trail
JSONL logs of every authorization decision, tied to agent identity
Human-in-the-Loop
Native OS approval dialogs for sensitive operations
Data Loss Prevention
DLP scanning with regex patterns for secrets, PII, and sensitive data
Zero Trust
Default deny — if not explicitly allowed, it’s blocked
Compliance Ready
SOC 2, GDPR, HIPAA, and SOX audit requirements built-in
Design Goals
- Language Agnostic — supports agents written in Python, JavaScript, Go, Java, Rust, and more
- Zero Trust — no implicit trust between agents or based on network location
- Minimal Overhead — fast token verification without centralized bottlenecks
- Compliance Ready — generates audit trails that satisfy SOC 2, GDPR, HIPAA, and SOX
- Developer Friendly — simple SDK integration that works locally without infrastructure
Quick Links
Why AIP?
Understand the threat model and security challenges AIP solves
Quickstart
Get started with AIP in under 5 minutes
Core Concepts
Learn about AATs, policies, and the two-layer architecture
Architecture
Deep dive into the Layer 1 and Layer 2 design
What Just Happened?
When an agent attempts a dangerous operation, AIP blocks it before the tool ever receives the request:
Your database never received the request. This is zero-trust authorization in action.