Ai-maestro-plugins agent-identity
Authenticate AI agents with auth servers using the Agent Identity (AID) protocol. Supports Ed25519 identity documents, proof of possession, OAuth 2.0 token exchange, and scoped JWT tokens. Self-contained — works independently without other protocols.
git clone https://github.com/23blocks-OS/ai-maestro-plugins
T=$(mktemp -d) && git clone --depth=1 https://github.com/23blocks-OS/ai-maestro-plugins "$T" && mkdir -p ~/.claude/skills && cp -r "$T/plugins/ai-maestro/skills/agent-identity" ~/.claude/skills/23blocks-os-ai-maestro-plugins-agent-identity && rm -rf "$T"
plugins/ai-maestro/skills/agent-identity/SKILL.mdAgent Identity (AID) Protocol
Authenticate AI agents with auth servers using cryptographic identity documents and proof of possession. AID is self-contained — no other protocols required.
When to use this skill
Use this skill when the user or task requires:
- Initializing an agent's Ed25519 identity
- Registering an agent's identity with an auth server
- Obtaining JWT tokens for API access via token exchange
- Checking an agent's AID registration status
- Setting up agent-to-server authentication
- Configuring scoped permissions for agent API access
Quick Start
# 1. Initialize agent identity (one-time) aid-init.sh --auto # 2. Register with an auth server (one-time, requires admin token) aid-register.sh --auth https://auth.23blocks.com/acme \ --token <ADMIN_JWT> --role-id 2 # 3. Get a JWT token TOKEN=$(aid-token.sh --auth https://auth.23blocks.com/acme --quiet) # 4. Use it for API calls curl -H "Authorization: Bearer $TOKEN" https://api.example.com/resource
Installation
For Claude Code (skill)
npx skills add agentmessaging/agent-identity
Quick Install
curl -fsSL https://raw.githubusercontent.com/agentmessaging/agent-identity/main/install.sh | bash
Manual
git clone https://github.com/agentmessaging/agent-identity.git ~/agent-identity export PATH="$HOME/agent-identity/scripts:$PATH"
Commands Reference
aid-init.sh — Initialize Agent Identity
Create an Ed25519 keypair and identity for this agent.
aid-init.sh --auto # Auto-detect name from environment aid-init.sh --name my-agent # Specify agent name aid-init.sh --name my-agent --force # Overwrite existing
Parameters:
— Auto-detect agent name from environment--auto
— Specify agent name--name, -n
— Overwrite existing identity--force, -f
aid-register.sh — Register with Auth Server
One-time registration linking the agent's Ed25519 identity to a tenant with a specific role.
aid-register.sh --auth https://auth.23blocks.com/acme \ --token <ADMIN_JWT> --role-id 2
Parameters:
— Auth server URL (required)--auth, -a
— Admin JWT for authorization (required)--token, -t
— Role ID to assign (required)--role-id, -r
— API key (X-Api-Key header)--api-key, -k
— Display name (default: agent name)--name, -n
— Agent description--description, -d
— Token lifetime in seconds (default: 3600)--lifetime, -l
What it does:
- Reads the agent's Ed25519 public key and identity
- POSTs the registration to the server's agent registration endpoint
- Stores the registration locally for future token exchanges
aid-token.sh — Exchange Identity for JWT Token
Performs the OAuth 2.0 token exchange using
grant_type=urn:aid:agent-identity.
# Get a token (uses cache if valid) aid-token.sh --auth https://auth.23blocks.com/acme # Get just the token string (for scripting) TOKEN=$(aid-token.sh --auth https://auth.23blocks.com/acme --quiet) # Get a token with specific scopes aid-token.sh --auth https://auth.23blocks.com/acme --scope "files:read files:write"
Parameters:
— Auth server URL (required)--auth, -a
— Space-separated scopes (optional)--scope, -s
— Output as JSON--json, -j
— Output only the token string--quiet, -q
— Skip token cache--no-cache
What it does:
- Builds a fresh Agent Identity Document with current timestamp
- Creates a Proof of Possession (
)aid-token-exchange\n{timestamp}\n{auth_issuer} - Signs the proof with the agent's Ed25519 private key
- POSTs to the OAuth token endpoint with
grant_type=urn:aid:agent-identity - Returns the JWT access token (cached for reuse)
aid-status.sh — Check Identity & Registration Status
aid-status.sh # Human-readable output aid-status.sh --json # JSON output
How AID Authentication Works
Step 1: Agent Identity Document
A signed JSON document proving the agent's identity:
{ "aid_version": "1.0", "address": "support-agent@default.local", "alias": "support-agent", "public_key": "-----BEGIN PUBLIC KEY-----\n...", "key_algorithm": "Ed25519", "fingerprint": "SHA256:abc123...", "issued_at": "2026-03-23T00:00:00Z", "expires_at": "2026-09-23T00:00:00Z", "signature": "base64-ed25519-signature" }
Step 2: Proof of Possession
The agent signs a challenge proving it holds the private key:
aid-token-exchange\n{timestamp}\n{auth_server_url}
Step 3: Token Exchange
POST /oauth/token Content-Type: application/x-www-form-urlencoded grant_type=urn%3Aaid%3Aagent-identity &agent_identity={base64url-identity-document} &proof={base64url-signed-proof}
Step 4: Use the JWT
The server returns a standard OAuth 2.0 response with an RS256 JWT access token. Use it with any API that validates JWTs via the auth server's JWKS endpoint.
Natural Language Examples
Agents should map these user intents to the appropriate commands:
- "Initialize my identity" ->
aid-init.sh --auto - "Register with the API" ->
aid-register.sh --auth <url> --token <jwt> --role-id <id> - "Get me an API token" ->
aid-token.sh --auth <url> - "Check my registrations" ->
aid-status.sh - "Authenticate with the auth server" ->
aid-token.sh --auth <url>
Security
- Self-contained — no external protocol dependencies
- Ed25519 signatures — identity documents are cryptographically signed
- Proof of possession — agents prove key ownership at every token exchange
- Human-controlled access — admin creates roles and registers agents
- Short-lived tokens — JWTs expire quickly, limiting blast radius
- No shared secrets — private keys never leave the agent
- Scoped access — tokens carry only the permissions the agent's role allows
Interoperability
AID shares the
~/.agent-messaging/agents/ directory with AMP if both are installed. One identity serves both protocols. Neither requires the other.
Troubleshooting
| Problem | Solution |
|---|---|
| "Agent identity not initialized" | Run |
| "Not registered" | Run with auth server details |
| "Proof expired" | Clock skew >5 minutes; sync system clock |
| "Invalid signature" | Agent identity may be corrupted; re-init and re-register |
| "Fingerprint mismatch" | Agent key changed since registration; re-register |
| "Scope not allowed" | Request only scopes granted during registration |
Protocol Reference
Full specification: https://agentids.org GitHub: https://github.com/agentmessaging/agent-identity