Back to Home
opena2a-org icon

agent-identity-management

Verified Safe

by opena2a-org

Overview

A production-ready identity verification and security platform for AI agents and Model Context Protocol (MCP) servers, providing cryptographic identity, access control, and real-time threat detection.

Installation

Run Command
docker compose up -d

Environment Variables

  • POSTGRES_HOST
  • POSTGRES_PORT
  • POSTGRES_USER
  • POSTGRES_PASSWORD
  • POSTGRES_DB
  • POSTGRES_SSL_MODE
  • REDIS_HOST
  • REDIS_PORT
  • REDIS_PASSWORD
  • REDIS_DB
  • JWT_SECRET
  • KEYVAULT_MASTER_KEY
  • EMAIL_FROM_ADDRESS
  • SMTP_HOST
  • SMTP_PORT
  • SMTP_USERNAME
  • SMTP_PASSWORD
  • FRONTEND_URL
  • ALLOWED_ORIGINS
  • ENVIRONMENT
  • DATABASE_URL
  • ADMIN_EMAIL
  • ADMIN_PASSWORD
  • ADMIN_NAME
  • ORG_NAME
  • ORG_DOMAIN
  • MAX_USERS
  • MAX_AGENTS
  • MCP_MIN_AGENTS_FOR_CONSENSUS
  • MCP_MIN_OWNERS_FOR_CONSENSUS
  • MCP_MIN_AGENT_TRUST_FOR_ATTESTATION
  • MCP_WARN_AGENT_TRUST_THRESHOLD
  • RATE_LIMIT_DEFAULT_MAX
  • RATE_LIMIT_DEFAULT_WINDOW_SEC
  • TEST_BASE_URL
  • BACKEND_URL
  • TEST_AGENT1_ID
  • TEST_AGENT2_ID
  • TEST_VECTORS_OUTPUT

Security Notes

The system is designed with strong security principles, including cryptographic identity (Ed25519, ML-DSA/PQC support), robust authentication/authorization, and rate limiting. It uses bcrypt for password hashing and implements measures to prevent information leakage in error responses. Critical components like JWT_SECRET and KEYVAULT_MASTER_KEY, along with other database/service passwords, have default values in development environments but are explicitly flagged for overriding in production. CORS middleware correctly rejects wildcards. The primary deduction is for the sheer number of secrets that require manual overriding for a secure production deployment, even if well-documented.

Similar Servers

Stats

Interest Score42
Security Score9
Cost ClassLow
Avg Tokens100
Stars28
Forks8
Last Update2026-01-07

Tags

Identity ManagementAI SecurityAccess ControlCryptographyThreat DetectionObservabilityCompliancePost-Quantum CryptographyAgent VerificationSupply Chain Security