Agentra LabsAgentra Labs DocsPublic Documentation

AgenticIdentity

Experience: With vs Without AgenticIdentity

| Aspect | Without AgenticIdentity | With AgenticIdentity |

Comparison

AspectWithout AgenticIdentityWith AgenticIdentity
Action attributionAnonymous and untraceableEvery action is cryptographically signed with Ed25519
Audit trailNo record of agent decisionsReceipts provide tamper-evident, chained audit trails
Trust relationshipsImplicit, unenforceable assumptionsExplicit, scoped, time-bounded, and revocable trust grants
Agent verificationNo way to verify who or what performed an actionAny party with the public key can verify action authenticity
Rogue agent responseCannot identify or isolate compromised agentsRevoke trust grants and terminate spawned children immediately
Multi-agent authNo authentication between collaborating agentsTrust web with delegation chains and capability-scoped permissions
Session continuityAgent state resets between sessionsContinuity engine with cumulative hashing across sessions
Agent lineageNo record of who created an agent or whyParent-child spawn records with verifiable ancestry to root
Competence evidenceClaims of ability are unverifiableSigned competence proofs backed by outcome history
Negative guaranteesNo way to prove an agent lacks a capabilityNegative capability proofs demonstrate structural impossibility
Key compromise recoveryNo mechanism for identity recoveryKey rotation with signed authorization chain preserving history
Team coordinationNo collective authorization mechanismQuorum-based team identities with threshold signing

Migration Path

Adopting AgenticIdentity does not require rewriting existing agent systems. The migration follows three stages:

Stage 1: Identity Only

Create identity anchors for existing agents. No behavioral changes required — agents gain a persistent, verifiable identity but continue operating as before. Install the MCP server and run identity_create for each agent.

Stage 2: Receipt Logging

Add receipt signing to agent actions. Wrap existing tool calls with action_sign to produce signed receipts. This adds an audit trail without changing the agent's decision-making logic.

Stage 3: Trust Enforcement

Introduce trust grants between agents. Use trust_grant to define capability scopes and trust_verify to check authorization before executing sensitive operations. This stage adds access control to the existing receipt-logged workflow.

Each stage is independently valuable. Stage 1 alone provides identity persistence. Stage 2 adds accountability. Stage 3 adds authorization. There is no requirement to adopt all three simultaneously.