Python SDK for the Agentic Power of Attorney (APOA) standard
Project description
APOA Python SDK
Python SDK for the Agentic Power of Attorney (APOA) standard -- authorization infrastructure for AI agents.
Install
pip install apoa
Quick Start
from apoa import (
APOADefinition, Agent, BrowserSessionConfig, Principal,
Rule, ServiceAuthorization, SigningOptions,
create_client, generate_key_pair,
)
# Generate keys and create a client
private_key, public_key = generate_key_pair()
client = create_client(default_private_key=private_key)
# Create a signed authorization token
token = client.create_token(APOADefinition(
principal=Principal(id="did:apoa:you"),
agent=Agent(id="did:apoa:your-agent", name="HomeBot Pro"),
services=[ServiceAuthorization(
service="nationwidemortgage.com",
scopes=["rate_lock:read", "documents:read"],
constraints={"signing": False},
access_mode="browser",
browser_config=BrowserSessionConfig(
allowed_urls=["https://portal.nationwidemortgage.com/*"],
credential_vault_ref="1password://vault/mortgage-portal",
),
)],
rules=[Rule(id="no-signing", description="Never sign anything", enforcement="hard")],
expires="2026-09-01",
))
# Authorize actions
result = client.authorize(token, "nationwidemortgage.com", "rate_lock:read")
print(result.authorized) # True
result = client.authorize(token, "nationwidemortgage.com", "documents:sign")
print(result.authorized) # False
Features
- Token lifecycle: create, sign (Ed25519/ES256), validate, parse
- Scope matching: hierarchical pattern matching (
appointments:*matchesappointments:read) - Constraint enforcement: boolean denial at the SDK level, rich constraints at the protocol level
- Authorization: revocation + scope + constraints + hard/soft rules in one call
- Delegation chains: parent-to-child with cryptographically enforced attenuation
- Cascade revocation: revoke parent, kill all children instantly
- Audit trail: append-only action log per token
- Cross-SDK compatibility: tokens created by the TypeScript SDK validate in Python and vice versa
Cross-SDK Compatibility
Tokens are JWTs. A token signed by @apoa/core (TypeScript) validates in apoa (Python) and vice versa. The serialization layer handles camelCase (JWT payload) to snake_case (Python) mapping automatically.
API
Two usage styles:
# Style 1: Client instance (recommended)
client = create_client(default_private_key=key)
client.authorize(token, "service.com", "action:read")
# Style 2: Standalone imports
from apoa import authorize, check_scope
check_scope(token, "service.com", "action:read")
See the full spec and TypeScript SDK for more.
License
Apache 2.0
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file apoa-0.1.1.tar.gz.
File metadata
- Download URL: apoa-0.1.1.tar.gz
- Upload date:
- Size: 27.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
6506dd0ef4eb33a642d4ae66f8991e1bbee83cbd28bcf07d6fbf473fb73eab30
|
|
| MD5 |
1c680579385fc832ef9542edae44f269
|
|
| BLAKE2b-256 |
1b2df7d17a9ad56011798519fa9459443309a248ec4bd0617d81c039141e8d1a
|
File details
Details for the file apoa-0.1.1-py3-none-any.whl.
File metadata
- Download URL: apoa-0.1.1-py3-none-any.whl
- Upload date:
- Size: 22.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
43bc4c704705227f49512e4ec8ff931a1620bf895f6b5dc30a6ad017129505d8
|
|
| MD5 |
c473786be8aca6bb15cd45c82075ec33
|
|
| BLAKE2b-256 |
c65fde2a46d27c33d717eb91638f43115c968065126c34ab449f965cd674430b
|