Agent Authentication
Overview
Authentication Architecture
Key Hierarchy
Organization
├── Service Keys (sk_live_*)
│ ├── Full platform access
│ ├── Vault management
│ └── Agent key provisioning
│
├── Agent Keys (ak_live_*)
│ ├── Scoped treasury operations
│ ├── Transaction execution
│ └── Balance queries
│
└── Observer Keys (ok_live_*)
├── Read-only access
└── Analytics queriesKey Types & Permissions
Type
Prefix
Use Case
Permissions
Rate Limit
Network Environments
Agent Key Provisioning
Creating Agent Keys
Permission Scopes
Model Context Protocol (MCP) Authentication
MCP Server Configuration
Programmatic MCP Client
On-Chain Transaction Signing
Option 1: Managed Wallet (Recommended)
Option 2: Bring Your Own Key (BYOK)
Key Rotation
Automated Rotation
Multi-Agent Authorization
Agent Consensus Flow
Security Best Practices
1. Key Storage
2. Least Privilege Permissions
3. Transaction Verification
4. Audit Logging
Rate Limiting
Tier
API Requests/min
On-Chain Ops/min
MCP Calls/min
Handling Rate Limits
Encryption & Privacy
Zero-Knowledge Transaction Privacy
Compliance & Auditing
Security Audits
Regulatory Compliance
Reporting Security Issues
Next Steps
Last updated