Skip to main content

Hardware-anchored identity SDK for AI agents -- 1id.com

Project description

oneid-sdk

Python SDK for 1id.com -- hardware-anchored identity for AI agents.

RFC: draft-drake-email-hardware-attestation-00

Quick start

import oneid

# Enroll at declared tier (no HSM needed, always works)
identity = oneid.enroll(request_tier="declared", display_name="Sparky")
print(f"Enrolled: {identity.handle}")
print(f"URN: {identity.agent_identity_urn}")

# Get an OAuth2 token for API access
token = oneid.get_token()
headers = {"Authorization": f"Bearer {token.access_token}"}

# Check identity
me = oneid.whoami()
print(f"I am {me.handle}, trust tier: {me.trust_tier.value}")

Hardware-backed enrollment

# TPM enrollment (sovereign tier) - requires Windows/Linux with TPM 2.0
identity = oneid.enroll(request_tier="sovereign")

# YubiKey enrollment (portable tier) - requires YubiKey 5 inserted
identity = oneid.enroll(request_tier="portable")

# Virtual TPM (VMware/Hyper-V/QEMU)
identity = oneid.enroll(request_tier="virtual")

Trust tiers

Tier Hardware Sybil Resistant Trust Level
sovereign TPM (Intel, AMD, Infineon) with valid cert Yes Highest
portable YubiKey / Nitrokey / Feitian with PIV attestation Yes High
virtual VMware / Hyper-V / QEMU vTPM No Verified Hardware
declared None (software keys) No Software

request_tier is a requirement, not a preference. You get exactly what you ask for, or an exception. No silent fallbacks.

Key algorithms

Like SSH, agents can choose their preferred key algorithm for declared-tier enrollment:

identity = oneid.enroll(request_tier="declared", key_algorithm="ed25519")     # default, strongest
identity = oneid.enroll(request_tier="declared", key_algorithm="ecdsa-p384")  # NIST P-384
identity = oneid.enroll(request_tier="declared", key_algorithm="rsa-4096")    # RSA compat

Installation

pip install oneid

Requires Python 3.10+.

License

Apache-2.0

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

oneid-1.3.0.tar.gz (101.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

oneid-1.3.0-py3-none-any.whl (82.2 kB view details)

Uploaded Python 3

File details

Details for the file oneid-1.3.0.tar.gz.

File metadata

  • Download URL: oneid-1.3.0.tar.gz
  • Upload date:
  • Size: 101.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for oneid-1.3.0.tar.gz
Algorithm Hash digest
SHA256 cc7af16d254cd064856654060787fd5aa58ee4b1ecee021e2b6cd9a137e5082c
MD5 aaaa58821fe6b0cd32a14cabf92b2bfc
BLAKE2b-256 2fa5c30b71e8996394b2984f132823e675226ed8b3290704335c90a635614f05

See more details on using hashes here.

File details

Details for the file oneid-1.3.0-py3-none-any.whl.

File metadata

  • Download URL: oneid-1.3.0-py3-none-any.whl
  • Upload date:
  • Size: 82.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for oneid-1.3.0-py3-none-any.whl
Algorithm Hash digest
SHA256 19ad939e744911a0bffe019ad851235e467a7ea50469db1c5a9fd20ca1ad1f05
MD5 523ab71aae7ce769db43bf2843306e71
BLAKE2b-256 bc2d160f3a3113c83d390fa4c09e710131fcc6d9910ad2dd77cd3b0c52a783cc

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page