AZTP (Agentic Zero Trust Protocol) Client Library for Python
Project description
AZTP Client Python
AZTP (Agentic Zero Trust Protocol) Client is an enterprise-grade identity service client that provides secure workload identity management using AZTP standards. The client library facilitates secure communication between workloads by managing digital identities and certificates.
Installation
pip install aztp-client
Requirements
- Python 3.8 or higher
Trusted Domains
The AZTP client maintains a whitelist of trusted domains for use with the trustDomain parameter. When you specify a domain that isn't in this whitelist, the client will display a warning and suggest valid alternatives from the approved list. If no trust domain is specified, the system defaults to aztp.network.
from aztp_client import Aztp, whiteListTrustDomains
# Check available trusted domains
print("Available trusted domains:", whiteListTrustDomains)
# Create a secure connection with a trusted domain
agent = await client.secure_connect(
crew_agent={},
"my-agent",
config={
"trustDomain": whiteListTrustDomains["gptapps.ai"], # Using a whitelisted domain
"isGlobalIdentity": False
}
)
Current Trusted Domains
gptarticles.xyzgptapps.aivcagents.ai
Quick Start
from aztp_client import Aztp, whiteListTrustDomains
# Initialize client
client = Aztp(api_key="your-api-key")
# Create a secure agent
agent = await client.secure_connect(
crew_agent={},
"service1",
config={
"isGlobalIdentity": False
}
)
# Create a secure agent with a trusted domain
agent_with_domain = await client.secure_connect(
crew_agent={},
'service2',
config={
"trustDomain": whiteListTrustDomains["gptapps.ai"], # Using first whitelisted domain
"isGlobalIdentity": False
}
)
# Verify identity
is_valid = await client.verify_identity(agent)
# Verify the identity connection
is_valid_connection = await client.verify_identity_connection(from_aztp_id, to_aztp_id)
# Get identity access policy
# Returns the access policy for the specified AZTP identity
# Raises ValueError if aztp_id is not properly formatted
# Raises RequestException if the request fails
identity_policy = await client.get_policy(agent.identity.aztp_id)
# Check available trusted domains
print("Available trusted domains:", whiteListTrustDomains)
# Get identity details
identity = await client.get_identity(agent)
# Discover identities
discovered_identities = await client.discover_identity()
# Discover identities with trust domain and requestor identity
discovered_identities = await client.discover_identity(trust_domain, requestor_identity)
Core Methods
Identity Management
secure_connect(crew_agent, name, config): Create a secure connection for a workloadverify_identity(agent): Verify the identity of a secured agentverify_identity_connection(from_aztp_id, to_aztp_id): Verify connection between two agentsget_identity(agent): Get identity information for a secured agentdiscover_identity(trust_domain, requestor_identity): Discover identities based on parameters
Policy Management
get_policy(aztp_id): Get access policy for a specific AZTP identity- Parameters:
aztp_id: Full AZTP ID (e.g., "aztp://domain/workload/environment/method/name")
- Returns: JSON-formatted access policy information
- Raises:
ValueError: If aztp_id is not properly formattedRequestException: If the request fails
- Parameters:
Example
import asyncio
import os
from pathlib import Path
from aztp_client import Aztp
from dotenv import load_dotenv
# Load the .env file from the correct location
load_dotenv()
async def main():
# Initialize the client with your API key
client = Aztp(
api_key= os.getenv("AZTP_API_KEY")
)
name = os.getenv("AZTP_AGENT_NAME")
otherNameA = os.getenv("AZTP_OTHER_AGENT_NAME_A")
otherNameB = os.getenv("AZTP_OTHER_AGENT_NAME_B")
# Get trust domain from environment or use a whitelisted domain
from aztp_client import whiteListTrustDomains
trustDomain = os.getenv("AZTP_TRUST_DOMAIN") or whiteListTrustDomains["gptapps.ai"]
# Validate trust domain against whitelist
if trustDomain not in whiteListTrustDomains:
print(f"Warning: Trust domain '{trustDomain}' is not in the whitelist.")
print(f"Available trusted domains: {', '.join(whiteListTrustDomains)}")
trustDomain = 'aztp.network'
try:
crewAgent = {}
crewAgentA = {}
crewAgentB = {}
# Create a secure agent
print("\nCreating secure agent...")
agent = await client.secure_connect(
crewAgent,
name,
{
"isGlobalIdentity": True
}
)
print(f"Agent {name} created successfully!")
if agent.identity.aztp_id:
print(f"Agent: {agent.identity.aztp_id}")
# Get and display the identity access policy
print("\nRetrieving identity access policy...")
try:
identity_policy = await client.get_policy(agent.identity.aztp_id)
print("\nIdentity access policy:", identity_policy)
# Process and display policy statements
for policy in identity_policy.data:
print("\nPolicy Statement:", policy.policyStatement)
if policy.policyStatement.Statement[0].Effect == "Allow":
print("Statement Effect:", policy.policyStatement.Statement[0].Effect)
print("Statement Actions:", policy.policyStatement.Statement[0].Action)
if hasattr(policy.policyStatement.Statement[0], 'Condition'):
print("Statement Conditions:", policy.policyStatement.Statement[0].Condition)
print("Identity:", policy.identity)
except ValueError as e:
print(f"Invalid AZTP ID format: {e}")
except Exception as e:
print(f"Failed to retrieve access policy: {e}")
#Example 1: Create a agent with linked identity
print("\nCreating agent with linked identity...")
agentA = await client.secure_connect(
crewAgentA,
otherNameA,
{
"linkTo": [agent.identity.aztp_id],
"isGlobalIdentity": False
}
)
print(f"Agent {otherNameA} created successfully!")
if agentA.identity.aztp_id:
print(f"Agent: {agentA.identity.aztp_id}")
#Example 2: Create a agent with linked identity, parent identity and trust domain
print("\nCreating agent with linked identity and trust domain...")
agentB = await client.secure_connect(
crewAgentB,
otherNameB,
{
"linkTo": [agent.identity.aztp_id],
"parentIdentity": agentA.identity.aztp_id,
"trustDomain": trustDomain, # Using validated trust domain from whitelist
"isGlobalIdentity": False
}
)
print(f"Agent {otherNameB} created successfully!")
if agentB.identity.aztp_id:
print(f"Agent: {agentB.identity.aztp_id}")
# Verify the identity
print(f"\nVerifying agent {name} identity...")
is_valid = await client.verify_identity(agent)
print(f"Identity valid: {is_valid}")
# Verify the identity connection
print(f"\nVerifying agent {name} identity connection with {otherNameB}...")
is_valid_connection = await client.verify_identity_connection(agent.identity.aztp_id, agentB.identity.aztp_id)
print(f"Connection valid: {is_valid_connection}")
# Get identity details
print(f"\nGetting agent {name} identity details...")
identity = await client.get_identity(agent)
if identity:
print(f"Retrieved identity: {identity}")
else:
print("No identity found")
# Discover identities
print(f"\nDiscovering all identities...")
discovered_identities = await client.discover_identity()
print(f"Discovered identities: {discovered_identities}")
# Discover identities with trust domain and requestor identity
print(f"\nDiscovering identities with trust domain {trustDomain} and requestor identity {agent.identity.aztp_id}...")
discovered_identities = await client.discover_identity(trust_domain=trustDomain, requestor_identity=agent.identity.aztp_id)
print(f"Discovered identities with trust domain and requestor identity: {discovered_identities}")
except ConnectionError as e:
print(f"Connection Error: Could not connect to the AZTP server. Please check your connection and server URL.")
print(f"Details: {e}")
except Exception as e:
print(f"Error: {str(e)}")
print("\nCurrent configuration:")
print(f"Base URL: {client.config.base_url}")
print(f"Environment: {client.config.environment}")
print("API Key: ********") # Don't print the API key for security
if __name__ == "__main__":
asyncio.run(main())
Features
- Workload Identity Management using AZTP standards
- Certificate Management (X.509)
- Secure Communication
- Identity Verification
- Identity Access Policy Management
- Metadata Management
- Environment-specific Configuration
- Trusted Domain Validation and Suggestions
Error Handling
The client includes comprehensive error handling for various scenarios:
- Connection Errors: Handles network and server connectivity issues
- Authentication Errors: Manages API key and authentication failures
- Validation Errors: Validates input parameters and trust domains
- Policy Errors: Handles policy retrieval and validation failures
License
MIT License
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file aztp_client-1.0.23.tar.gz.
File metadata
- Download URL: aztp_client-1.0.23.tar.gz
- Upload date:
- Size: 11.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
cbc0981923ac5575db6a19154f09c7edf97950fedc2d3957744601d4cd55fe68
|
|
| MD5 |
39281fb0013a4db20b065fc2a1d4bd8a
|
|
| BLAKE2b-256 |
c2d5d8696303f1cb4509d790d78efb5169d23366bfb99989181543c903028084
|
File details
Details for the file aztp_client-1.0.23-py3-none-any.whl.
File metadata
- Download URL: aztp_client-1.0.23-py3-none-any.whl
- Upload date:
- Size: 10.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
6482d1cb8746992737f7be46fd2f139010ff9edd896acb1fefd38be6cf464be8
|
|
| MD5 |
d229d81b320bd7438d63caf9f406fa3c
|
|
| BLAKE2b-256 |
8b109c25fccee69e7d4d7af8e716528748f1232f357a450deb3ce822f6675a10
|