Why KYA

The missing trust layer for AI agents acting in production.

AI agents can now trigger real-world actions: purchases, CRM writes, deployments. The core risk is simple — an agent acts with too much power, or outside policy, and you only discover it after damage is done.

The Problem#

Without a control gate, one bad call can:

  • Execute an unauthorized purchase
  • Push wrong data to your CRM
  • Trigger an unsafe deploy
  • Act beyond the intended scope with no audit trail

The KYA Verify Gate#

KYA adds one decision point before every execution:

POST /verify
→ decision: ALLOW | DENY
→ reason_code: null | "SPEND_LIMIT_EXCEEDED" | ...
→ audit_event_id: "evt_01J..."

Your app executes only on ALLOW. On DENY, you get a reason code you can log, handle, or surface to the user.

What This Gives You#

CapabilityWhat it means
IdentityCryptographic proof of which agent is acting (Ed25519)
Permission controlDefine exactly what each agent can do (tools, spend, rate)
Audit trailTamper-evident log of every decision with hash-chain integrity
RevocationStop a compromised agent or capability in seconds

KYA vs. Traditional IAM#

Traditional IAM (Auth0, Okta) is designed for humans who log in once and get a session. AI agents operate differently — they act continuously, autonomously, and at machine speed. KYA is built specifically for this model:

Human IAMKYA (Agent IAM)
Identity unitUser accountAgent (Ed25519 keypair)
Token modelLong-lived JWT sessionShort-lived capability (5–30 min)
ScopePer userPer action
RevocationSession invalidationSeconds, capability blacklist
AuditLogin eventsEvery action, hash-chained
PolicyRBAC / ABACPer-agent tool + spend + rate limits

KYA is the trust layer between agent intent and production action.