English | 中文
Quick Start · Architecture · Security · Documentation · Roadmap
Open Agent Auth is an enterprise-grade authorization framework that provides cryptographic identity binding, fine-grained authorization, request-level isolation, and semantic audit trails for AI agents operating on behalf of users. It builds a collaborative ecosystem where humans, agents, and resource providers work as equal partners with mutual trust and accountability.
The framework is implemented based on IETF Draft: Agent Operation Authorization (draft-liu-agent-operation-authorization-00), extending upon this standard by leveraging industry-standard protocols (OAuth 2.0, OpenID Connect, WIMSE, W3C VC) and featuring Model Context Protocol (MCP) integration to ensure every agent-executed operation is traceable to explicit user consent.
Open Agent Auth is in public beta — feature-complete, actively evolving, and ready for you to explore.
The core is working, the API is stabilizing, and your feedback still shapes the road to 1.0.0 We ship fast, iterate faster, and track everything openly in our roadmap.
- ✅ Side projects, prototypes, internal tools — go for it
- ✅ Evaluating for future production use — great timing
- ⏳ Mission-critical production — 1.0.0 release is on the horizon
Star ⭐ the repo to follow our journey, or check out the Contributing Guide to help us get there.
When AI agents execute operations on behalf of users, traditional authorization mechanisms face critical challenges:
- Identity ambiguity: How to prove an operation was initiated by the actual user?
- Authorization inflexibility: How to achieve fine-grained permission management for diverse agent operations?
- Lack of isolation: How to prevent one request from affecting another?
- Missing audit trail: How to trace operations from user input to resource access?
Open Agent Auth addresses these challenges through:
| Challenge | Traditional Approach | Open Agent Auth Solution |
|---|---|---|
| Identity Binding | Single-layer authentication | Three-layer cryptographic binding (User-Workload-Token) |
| Authorization | Coarse-grained permissions | Fine-grained permission management with dynamic policy evaluation |
| Workload Isolation | Process or container level | Request-level virtual workload with temporary keys |
| Audit Trail | Basic operation logs | Semantic audit with W3C VC and complete context |
- 🔐 WIMSE Workload Identity Pattern: Request-level isolation with temporary key pairs following draft-ietf-wimse-workload-creds
- 🔗 Cryptographic Identity Binding: End-to-end identity consistency through three-layer binding (ID Token → WIT → AOAT)
- 📝 Semantic Audit Trail: W3C VC-based verifiable credentials recording complete context from user input to resource operation
- 🎯 Dynamic Policy Registration: Runtime policy updates with OPA, RAM, ACL without service restart
- 🛡️ Multi-Layer Verification: Comprehensive security validation at every access point
- 🌐 Standard Protocols: Built on OAuth 2.0, OIDC, WIMSE, MCP for easy integration
Get Open Agent Auth running in 5 minutes.
- Java 17+
- Maven 3.6+
The sample project provides two startup options:
# Clone and build
git clone https://github.com/alibaba/open-agent-auth.git
cd open-agent-auth
mvn clean package -DskipTests
# Start all services with mock LLM
cd open-agent-auth-samples
./scripts/sample-start.sh --profile mock-llm
# Access the agent interface
open http://localhost:8081Note: The Mock LLM uses keyword-based matching. For available products and matching rules, see Mock LLM Guide.
The sample project integrates qwencode-sdk, enabling direct integration with QwenCode for a deeper experience.
To use QwenCode:
-
Install QwenCode
Follow the installation guide at: QwenCode Documentation
-
Start Sample Project
After installing QwenCode, start the services without parameters:
# Clone and build git clone https://github.com/alibaba/open-agent-auth.git cd open-agent-auth mvn clean package -DskipTests # Start all services with QwenCode integration cd open-agent-auth-samples ./scripts/sample-start.sh # Access the agent interface open http://localhost:8081
Note: Make sure QwenCode is properly installed and configured before using this option. If you encounter any issues, use Option 1 (Mock LLM) for quick testing.
Demo Walkthrough
The following screenshots demonstrate the authorization flow when using Option 1 (Mock LLM). The flow is the same for Option 2 (QwenCode), but with a real LLM providing responses.
The screenshots demonstrate the authorization flow, from user authentication through agent operation authorization to response delivery:
Add the dependency to your pom.xml:
<dependency>
<groupId>com.alibaba.openagentauth</groupId>
<artifactId>open-agent-auth-spring-boot-starter</artifactId>
<version>0.1.0-beta.1-SNAPSHOT</version>
</dependency>Note: The Open Agent Auth artifacts are not yet published to Maven Central. For now, you need to build the project locally and install it to your local Maven repository:
git clone https://github.com/alibaba/open-agent-auth.git cd open-agent-auth mvn clean install -DskipTests
Configure JWKS endpoints and other settings. For complete configuration options, see Configuration Guide.
For detailed integration instructions and advanced usage, see Integration Guide.
Open Agent Auth implements a zero-trust security architecture with four distinct layers:
The architecture consists of:
- User Interaction Layer: Users interact with AI agents through natural language
- Identity Authentication Layer: Manages user and workload identities via multiple IDPs
- Authorization Management Layer: Handles authorization requests and policy evaluation
- Resource Access Layer: Hosts protected resources with five-layer verification
The Resource Server implements a comprehensive multi-layer security verification mechanism aligned with industry standards. For detailed information about the verification layers, see Multi-Layer Verification.
sequenceDiagram
participant User
participant Agent
participant AgentIDP
participant AuthServer
participant ResourceServer
User->>Agent: Natural Language Request
Agent->>AgentIDP: Create Virtual Workload
AgentIDP-->>Agent: WIT (Workload Identity Token)
Agent->>AuthServer: PAR Request (with Operation Proposal JWT)
AuthServer-->>Agent: request_uri
Agent->>User: Redirect to /authorize?request_uri=...
User->>AuthServer: Approve Authorization
AuthServer-->>Agent: AOAT (Agent Operation Authorization Token)
Agent->>ResourceServer: Tool Call (WIT + AOAT + WPT)
ResourceServer->>ResourceServer: Multi-Layer Verification
ResourceServer-->>Agent: Execution Result
Agent-->>User: Display Result
The framework implements a three-layer identity binding mechanism that cryptographically links user identity to agent operations:
-
User Identity Layer: The ID Token's subject claim represents the authenticated user identity, established through OAuth 2.0 and OpenID Connect authentication flows.
-
Workload Identity Layer: The Workload Identity Token's subject is cryptographically bound to the user identity via the WorkloadRegistry, creating a secure association between the user and the virtual workload representing their request.
-
Authorization Layer: The Agent Operation Authorization Token carries the workload identity, completing the chain from user to authorized operation.
This binding is cryptographically verified at each layer through digital signatures and claims validation, ensuring every operation can be unambiguously traced back to the originating user and their explicit consent.
The framework provides fine-grained permission management for diverse agent operations through dynamic policy evaluation. It supports multiple policy engines (OPA, RAM, ACL) that can be updated at runtime without service restart, enabling precise, context-aware authorization decisions for each agent operation. OPA (Open Policy Agent) enables Attribute-Based Access Control (ABAC) with flexible policy rules based on user attributes, resource properties, and environmental context, allowing dynamic authorization decisions that adapt to complex business scenarios.
Each user request operates in an isolated virtual workload environment with temporary cryptographic credentials, implementing the WIMSE Workload Identity Credentials protocol:
- Request-level isolation: Supports both strict isolation and controlled reuse to prevent cross-request contamination
- Temporary credentials: Workload Identity Tokens (WIT) and Workload Proof Tokens (WPT) exist only for the request lifecycle
- Automatic cleanup: Resources freed after request completion
- Trust domain scoping: Workload identities are scoped within a trust domain (e.g.,
wimse://default.trust.domain)
W3C VC-based verifiable credentials record complete context from user input to resource operation, enabling transparent and auditable agent operations. For detailed information about the audit trail components, see Audit and Compliance.
Open Agent Auth implements comprehensive security measures across all layers:
- Zero-Trust Architecture: Every request is authenticated and authorized regardless of network location
- Cryptographic Verification: Multi-layer digital signature validation ensures token integrity and authenticity
- Threat Mitigation: Multiple layers of protection against replay attacks, token theft, and man-in-the-middle attacks
- Audit & Compliance: W3C VC-based verifiable audit trails for regulatory compliance and forensic analysis
- Secure Key Management: Proper key lifecycle management for JWKS endpoints and temporary credentials
For detailed security architecture, see Security Documentation.
- Quick Start Guide - Get started in 5 minutes
- Configuration Guide - Detailed configuration options
- User Guide - Complete user documentation
- Integration Testing Guide - Integration testing guide
Open Agent Auth v0.1.0-beta.1 is in public beta — feature-complete, actively evolving, and ready for you to explore. The core is working, the API is stabilizing, and this release establishes the foundation for enterprise-grade AI agent operation authorization with the following core capabilities:
Core Features
- Three-layer cryptographic identity binding (ID Token → WIT → AOAT)
- WIMSE Workload Identity Pattern for request-level isolation
- Fine-grained authorization with dynamic policy evaluation (OPA, RAM, ACL)
- Semantic audit trails based on W3C Verifiable Credentials
- Multi-layer verification architecture for comprehensive security
Integration Support
- Spring Boot 3.x autoconfiguration
- Model Context Protocol (MCP) adapter
- OAuth 2.0 and OpenID Connect compliance
- Flexible JWKS endpoint configuration for token verification
Quality & Documentation
- Test coverage > 80%
- Essential API documentation
- Quick start guide (5 minutes)
- Architecture and security documentation
The following enhancements are planned for upcoming releases:
Authorization Discovery
- Enable dynamic authorization server discovery from resource server responses
- Support for authorization server address negotiation and routing
- Flexible authorization flow based on resource provider's authorization requirements
Agent-to-Agent Authorization
- Enable secure authorization between multiple AI agents
- Support for agent delegation and chained authorization flows
- Cross-agent identity verification and trust establishment
OpenAPI Adapter
- REST API integration adapter for web applications
- Automatic policy generation from OpenAPI specifications
- API gateway integration for centralized authorization
Prompt Security Transmission
- Secure prompt passing mechanism with encryption
- Prompt protection against injection and tampering
- Reference implementation for secure prompt handling
Enhanced Audit & Compliance
- Comprehensive audit log enrichment
- Regulatory compliance reporting (SOC2, GDPR, etc.)
- Real-time audit monitoring and alerting
- Audit data retention and archival policies
The project is organized into the following modules:
- open-agent-auth-core: Core interfaces and models
- open-agent-auth-framework: Framework implementation
- open-agent-auth-spring-boot-starter: Spring Boot autoconfiguration
- open-agent-auth-mcp-adapter: MCP protocol adapter
- open-agent-auth-samples: Sample applications
This project is licensed under the Apache License 2.0 - see the LICENSE file for details.
Built upon industry-standard protocols and frameworks:
- OAuth 2.0 - Authorization framework
- OpenID Connect - Identity layer
- WIMSE - Workload identity management
- W3C VC - Verifiable Credentials Data Model
- MCP - Model Context Protocol
- OPA - Policy engine
- Spring Boot - Application framework
Making AI Agent Operations Safer, More Controllable, and More Traceable








