WIMSE Workload Identity
Request-level isolation with temporary key pairs following the WIMSE protocol. Each user request operates in an independent virtual workload environment.
Cryptographic identity binding, fine-grained authorization, and semantic audit trails for AI agents operating on behalf of users.

Equal partners. Trust actions.
The social contract for the agent era.
Everything you need to integrate enterprise-grade agent authorization.
Every agent operation is authenticated, authorized, and auditable through a standards-based flow.
User authenticates via OpenID Connect. The Agent creates a virtual workload with temporary WIMSE credentials, binding user identity to a request-scoped environment.
Agent submits an Operation Proposal via OAuth 2.0 PAR. The Authorization Server evaluates policies (OPA / RAM / ACL) and issues an Agent Operation Authorization Token.
Resource Server performs five-layer verification — workload auth, request integrity, user auth, identity consistency, and policy evaluation — then executes the operation.
Traditional authorization wasn't designed for agents acting on behalf of users.
Leveraging battle-tested protocols for enterprise-grade security.
Open Agent Auth is open-source under Apache 2.0. Star us on GitHub, try the sample project, or dive into the docs.