Skip to main content

Portable identity for AI agents across MCP, A2A, ANP, and AG-UI protocols

Project description

Agent Identity Bridge (AIB)

One identity. Every protocol. Full audit trail.

Tests Python License PyPI Edge Functions Version

AIB is an open-source protocol that gives AI agents a single portable identity across MCP (Anthropic), A2A (Google), ANP, and AG-UI — with W3C DID v1.1, Verifiable Credentials, and EU AI Act compliance built in.

The problem

Each AI protocol invented its own identity system. An agent operating across MCP + A2A + AG-UI has three separate identities with zero link between them. Cross-protocol auditing is impossible, credential management is painful, and EU AI Act compliance is a nightmare.

Quick start

pip install agent-identity-bridge
python -c "from aib import PassportService; print('AIB ready')"

Run the interactive demo (15 seconds, zero config)

curl -sO https://raw.githubusercontent.com/tntech-consulting/agent-identity-bridge/main/examples/quickstart.py
python quickstart.py

AIB Cloud (managed SaaS)

from aib.cloud import AIBCloud

client = AIBCloud("aib_sk_live_...")

passport = client.create_passport("my-bot", protocols=["mcp", "a2a", "ag_ui"])
mcp_card = client.translate(a2a_card, "a2a_agent_card", "mcp_server_card")
client.create_policy("deliverable_gate", {"required_capabilities": ["tests_passed"]})
client.create_webhook("https://your-app.com/hooks", events=["passport.created"])

Local protocol (self-hosted)

from aib.passport import PassportService, McpBinding, A2aBinding

svc = PassportService(secret_key="your-secret")
passport, token = svc.create_passport(
    org_slug="mycompany", agent_slug="booking-agent",
    capabilities=["booking", "scheduling"],
    bindings={"mcp": McpBinding(auth_method="oauth2"), "a2a": A2aBinding(auth_method="bearer")},
)

Framework integrations

from aib.integrations import get_langchain_tools   # LangChain
from aib.integrations import get_crewai_tools       # CrewAI
from aib.integrations import get_openai_agents_tools # OpenAI Agents SDK

Key features

  • Portable identity: One passport, valid on MCP, A2A, ANP, AG-UI
  • Credential translation: 6 paths across 4 formats (< 1ms)
  • W3C DID v1.1: did:web + did:key, resolvable by any Universal Resolver
  • W3C Verifiable Credentials: Ed25519Signature2020 proof, StatusList2021 revocation
  • EU AI Act compliance: 7 structured fields (intent, risk_level, human_oversight, etc.) in every signed receipt
  • Policy engine: 12 rule types — deliverable gates, separation of duties, capability enforcement
  • Ed25519 audit trail: Signed receipts with SHA-256 hash chaining, AES-256 encrypted keys
  • OIDC federation: Google, Microsoft Entra, Okta, Auth0 — bring your own IdP
  • Webhooks: 4 event types, HMAC-SHA256 signed payloads
  • Rate limiting: 30 req/min per IP (HTTP) + policy-based per org
  • Intent inference: LLM-powered analysis of agent behavior patterns
  • Delegation chains: Parent → child with scope narrowing enforcement
  • Framework integrations: LangChain, CrewAI, OpenAI Agents SDK

AIB Cloud — Managed SaaS

19 Edge Functions, 13 API endpoints, 17 tables with RLS.

Feature Community Pro (990€/mo) Enterprise
Passports 10 500 Unlimited
Transactions/mo 1,000 100,000 Custom
Policy rules 3 50 Custom
OIDC federation
Webhooks 1 20 Custom
Intent inference
VCs

Dashboard: aib-tech.fr/dashboard EU AI Act Compliance Kit: aib-tech.fr/compliance

How AIB relates to existing solutions

AIB is a standard, not a product. It bridges protocols, it doesn't compete with IAM vendors.

  • MCP connects agents to tools. AIB connects agents to all protocols.
  • A2A coordinates agents. AIB gives each agent an identity usable everywhere.
  • Okta/Entra authenticates humans. AIB bridges their tokens to agent passports via OIDC federation.
  • SailPoint discovers and governs agents. AIB gives them portable identities across protocols.

No European competitor exists for cross-protocol agent identity + DID + VCs + EU AI Act compliance. See aib-tech.fr/why for full positioning.

Contributing

Apache 2.0 licensed. Contributions welcome.

git clone https://github.com/tntech-consulting/agent-identity-bridge.git
cd agent-identity-bridge
pip install -e ".[dev]"
pytest  # 1,054 tests

Author

Thomas NirennoldTNTECH CONSULTING SAS (SIREN 993811157), Paris, France

Protocol · Why AIB · Compliance Kit · Blog · PyPI

License

Apache 2.0 — see LICENSE

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

agent_identity_bridge-2.16.0.tar.gz (4.6 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

agent_identity_bridge-2.16.0-py3-none-any.whl (165.8 kB view details)

Uploaded Python 3

File details

Details for the file agent_identity_bridge-2.16.0.tar.gz.

File metadata

  • Download URL: agent_identity_bridge-2.16.0.tar.gz
  • Upload date:
  • Size: 4.6 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.3

File hashes

Hashes for agent_identity_bridge-2.16.0.tar.gz
Algorithm Hash digest
SHA256 c77755fd95627af069bb5ae01f3f85fcae8e22063be11470684279f4db65dc16
MD5 ec77d606b0e9d36db5ad54eadc798354
BLAKE2b-256 3c778ac046c9de5406a70724d0871641d0eaf63ce3c5c139f014f58ef8a7f971

See more details on using hashes here.

File details

Details for the file agent_identity_bridge-2.16.0-py3-none-any.whl.

File metadata

File hashes

Hashes for agent_identity_bridge-2.16.0-py3-none-any.whl
Algorithm Hash digest
SHA256 d410995a3b6eda75c41ee5aa2ff2bebf501245d12b126641beda10b0c7ccdab3
MD5 90f1de967f87101efba25629d462408c
BLAKE2b-256 4c540e92fe3ab2a425ce3326ecfb7c1f97b0ec2bad89cab5537af83f264bb3a8

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page