AXIS is an open standard for autonomous agent identity, delegation, and authorization across operator boundaries. AXIS Prime is the reference implementation of the registry. Verification is local. The spec is Apache 2.0. Anyone can run another.
Every AXIS-compliant registry exposes the same REST surface. Credential chains are self-contained. Receiving platforms verify locally and only call the registry for public key retrieval and revocation checks.
Operators register agents with a registrar. Registrars write identity records to a registry. Agents carry a signed identity token and a delegation chain. Receiving platforms verify the chain locally.
AXIS Prime is the reference implementation. The protocol is registry-agnostic: any party can run one.
Identity, authorization, and reputation are distinct layers of the protocol. Layers 1 and 2 are mandatory for verification. Layer 3 is advisory.
Persistent record of an agent's existence, public key, and status. Resolvable from the registry URL carried in every token.
The human or organization at the root of every delegation chain. Verification tier indicates how thoroughly the registrar verified them.
Signed JWT presented at time of action. Ed25519 per RFC 8037. Short-lived; agents re-mint from their private key as needed.
Signed scope and time constraints. Attenuation rule: scope narrows down the chain, never widens. Root-operator invariant prevents rerooting.
Signed reputation statement about an agent or operator. Stored by the issuer, not the registry. Aggregation is out of scope for v0.1.
Signed binding of content to the agent, delegation credential, and reviewer that produced it. Verifiable without prior relationship.
AXIS sits inside the identity, credential, and compliance standards organizations already depend on. No novel cryptography. No proprietary primitives.
Agent identifiers are compatible with W3C Decentralized Identifiers. Resolution via did:axis:{registry}:{agent}.
Identity tokens follow RFC 7519, signed with EdDSA per RFC 8037. Ed25519 throughout.
AXIS was submitted to the NIST National Cybersecurity Center of Excellence as part of its agent identity concept-paper process.
The security model is inspired by the hierarchical trust framework that secures the internet's naming system.
The delegation chain meets the automatic event recording and traceability requirements for high-risk AI systems.
AXIS is Apache 2.0. Implement it, fork it, build on it. The base layer belongs to everyone.