Skip to main content

Hardware-anchored identity SDK for AI agents -- 1id.com

Project description

oneid-sdk

Python SDK for 1id.com -- hardware-anchored identity for AI agents.

RFC: draft-drake-email-hardware-attestation-00

Quick start

import oneid

# Enroll at declared tier (no HSM needed, always works)
identity = oneid.enroll(request_tier="declared", display_name="Sparky")
print(f"Enrolled: {identity.handle}")
print(f"URN: {identity.agent_identity_urn}")

# Get an OAuth2 token for API access
token = oneid.get_token()
headers = {"Authorization": f"Bearer {token.access_token}"}

# Check identity
me = oneid.whoami()
print(f"I am {me.handle}, trust tier: {me.trust_tier.value}")

Hardware-backed enrollment

# TPM enrollment (sovereign tier) - requires Windows/Linux with TPM 2.0
identity = oneid.enroll(request_tier="sovereign")

# YubiKey enrollment (portable tier) - requires YubiKey 5 inserted
identity = oneid.enroll(request_tier="portable")

# Virtual TPM (VMware/Hyper-V/QEMU)
identity = oneid.enroll(request_tier="virtual")

Trust tiers

Tier Hardware Sybil Resistant Trust Level
sovereign TPM (Intel, AMD, Infineon) with valid cert Yes Highest
portable YubiKey / Nitrokey / Feitian with PIV attestation Yes High
virtual VMware / Hyper-V / QEMU vTPM No Verified Hardware
declared None (software keys) No Software

request_tier is a requirement, not a preference. You get exactly what you ask for, or an exception. No silent fallbacks.

Key algorithms

Like SSH, agents can choose their preferred key algorithm for declared-tier enrollment:

identity = oneid.enroll(request_tier="declared", key_algorithm="ed25519")     # default, strongest
identity = oneid.enroll(request_tier="declared", key_algorithm="ecdsa-p384")  # NIST P-384
identity = oneid.enroll(request_tier="declared", key_algorithm="rsa-4096")    # RSA compat

Installation

pip install oneid

Requires Python 3.10+.

License

Apache-2.0

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

oneid-1.2.0.tar.gz (100.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

oneid-1.2.0-py3-none-any.whl (81.6 kB view details)

Uploaded Python 3

File details

Details for the file oneid-1.2.0.tar.gz.

File metadata

  • Download URL: oneid-1.2.0.tar.gz
  • Upload date:
  • Size: 100.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.10

File hashes

Hashes for oneid-1.2.0.tar.gz
Algorithm Hash digest
SHA256 48977bd61840bda71c31ddd78e526306101d036954db4bf995c2f164e847ae72
MD5 c2bc188301c5d92c37d9b441a03c10d6
BLAKE2b-256 be40832b5b6e3081050867c61a0cc381ba49648103a84074c0cf2eca2839407e

See more details on using hashes here.

File details

Details for the file oneid-1.2.0-py3-none-any.whl.

File metadata

  • Download URL: oneid-1.2.0-py3-none-any.whl
  • Upload date:
  • Size: 81.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.10

File hashes

Hashes for oneid-1.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 3aa8497b7d721f499efa3f872a238e7452c70544a45d7a683aec2bd43f091a60
MD5 2f4b3b19d3124b40d581ecccf1eaa8d1
BLAKE2b-256 a56d8cf05603c995e49b6088e2fa46406b90c61a1a381014ba77509099be0dcb

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page