Kazbah
Authority/Passports

Agent Passports

Cryptographic identity for every AI agent

An agent passport is a portable, persistent credential that proves who an agent is, who operates it, and what it's authorized to do. It's not a token or an API key — it's a structured, signed identity document that travels with the agent across systems.

API Keys Are Not Identity

Today, agents authenticate with API keys and OAuth tokens — systems designed for humans and static services. These credentials say who claims to operate the agent, not what the agent actually is.

If someone swaps the underlying model — replacing GPT-4 with a fine-tuned variant — the credential still works. Nobody knows the agent changed. There's no way to verify what model is running, what permissions it should have, or whether the credential should still be valid.

Identity Bound to What the Agent Is

A passport binds to computational identity — the agent's model architecture, version, and optionally a hash of its weights. This is fundamentally different from principal identity (who operates the agent) or workload identity (what infrastructure runs it).

If the model changes, the passport is invalidated. The agent must re-attest before it can operate with trusted credentials. This prevents silent model substitution — the most dangerous gap in current agent identity systems.

DimensionAPI Keys / OAuthWorkload IdentityKazbah Passport
Binds toHuman / principalInfrastructureModel instance
PersistenceSessionService lifetimeTask-spanning, persistent
PermissionsStatic rolesStatic policiesDynamic, decaying, budgeted
DelegationLimitedNoneAttenuated chains
RevocationEventually consistentEventually consistentReal-time, mid-execution
Trust evidenceNoneNoneEmbedded scores & attestations
Key Capabilities
01

Issue in Seconds

Create a passport with a few lines of code or through the dashboard. Define permissions, spend limits, and expiration. The agent is credentialed and ready.

02

Delegation with Attenuation

Agents can delegate authority to other agents — but permissions can only shrink through the chain, never expand. An orchestrator with read/write/spend can delegate read-only to a sub-agent. The sub-agent cannot escalate.

03

Trust Tier Progression

Passports carry trust scores that evolve based on the agent’s track record. New agents start at the lowest tier. Verified behavior history raises the tier — unlocking access to higher-trust resources.

04

Dynamic Permissions

Permissions decay over time, operate within budgets, and can be requested just-in-time. An agent can ask for a permission it doesn’t have, with a machine-readable justification routed to human approval or auto-approval.

05

Selective Disclosure

Share only what’s needed. A passport can prove an agent’s trust tier without revealing its full permission set.

06

Portable Across Systems

Works across any system that trusts the issuing authority. No per-system integration. Signed with standard Ed25519 cryptography. Verifiable anywhere.

Give your agents real identity.