-
Notifications
You must be signed in to change notification settings - Fork 0
Home
This wiki is auto-generated from the
wiki/folder in the main repo. Edit the source files there, not through the web UI — direct edits will be overwritten on the next push tomain. The canonical source iswiki/inlitentry/agentKeys.
AgentKeys is a credential custody service: a TEE-backed vault that issues long-lived bearer tokens for per-agent credential access, with on-chain audit. We mint ephemeral credentials; daemons use them to call remote services directly. Credential broker, not operation proxy.
Every spec and every service on top of AgentKeys preserves these four invariants (details in Blockchain TEE Architecture §6):
- Chain stores everything persistent — single source of truth.
- TEE holds all private keys and does all computation — no key leaves the enclave.
- Clients hold only a JWT, not private keys — bearer tokens, short blast radius.
- AgentKeys brokers credentials, not operations — daemons call remote services directly; our compute scales with user count, not operation frequency.
- Blockchain TEE Architecture — chain + TEE + clients; the four rules in §6
- Session Token — 30-day JWT bearer; issuance, storage, revocation
- Key Security — TEE keys, master session key, storage tiers, threat model
- Data Classification — data classes, where each lives, retention policy
- Credential Usage — store → run/read → revoke
- Serve and Audit — Pattern-4 per-read audit flow
Design docs for specific services built on top of the foundations:
- Overview — tree + reading order for the service-architecture pages
-
Hosted-First — Stage 6 default (
xyz@agentkeys-email.ioon our infra) vs bring-your-own (advanced) -
Tag-Based Access —
agentkeys_user_walletJWT claim → AWS PrincipalTag → per-user isolation on shared buckets - OIDC Federation — TEE as a conforming OIDC issuer; one ES256 key federates into AWS / GCP / Azure / Ali / K8s
- Email System — Stage 6 email architecture on AWS SES; broker-not-proxy; zero per-operation compute
- Knowledge Storage — deferred backend decision between GitHub / AWS S3 / Google Drive / Ali Cloud OSS, by user segment
| Role | Start here | Then | Then |
|---|---|---|---|
| New engineer | Blockchain TEE Architecture | Session Token | Email System |
| Product / roadmap | This page, §Wiki tree | docs/spec/plans/development-stages.md |
Hosted-First |
| Operator / infra | Key Security, Serve and Audit | docs/spec/ses-email-architecture.md |
OIDC Federation §Consumer-registration recipes |
| Security reviewer | Blockchain TEE Architecture §6 (four rules) | Data Classification | Tag-Based Access §Security and attacker surface |
Canonical design records live in docs/spec/:
-
docs/spec/plans/development-stages.md— build plan. Stages 0–5 shipped; Stage 6 = federated own email; Stage 7 = generalized OIDC provider; remaining stages postponed. -
docs/spec/ses-email-architecture.md— Stage 6 SES email spec. -
docs/spec/email-signing-backends.md— generalized backend comparison (SES / DWD / SaaS). -
docs/spec/credential-backend-interface.md— theCredentialBackendtrait. -
docs/spec/architecture.md— 13-component system architecture. -
docs/spec/heima-gaps-vs-desired-architecture.md— living gap list: where current upstreamlitentry/heimadiffers from what the wiki describes (HDKD master seed, OIDC provider, BYODKIM, email pallets, session-tag propagation).
Demo / operator docs:
-
docs/manual-test-stage4.md— Stage 4 end-to-end walkthrough -
docs/manual-test-stage5.md— Stage 5 demo (dedicated-Gmail quick path) -
docs/stage5-workspace-email-setup.md— advanced BYO Workspace runbook (deferred past Stage 7) -
docs/contradictions.md— living tracker of cross-doc contradictions
- Open
wiki/<Page>.mdin the main repo. - Make changes in a PR.
- Merge to
main. - The
Publish wikiGitHub Action mirrorswiki/**to the wiki repo.
A maintainer can also trigger the mirror manually from the repo's Actions tab — the workflow exposes workflow_dispatch.
See .github/workflows/publish-wiki.yml for the implementation.