Authorization that knows who you are and who you brought.
Express delegation policy as structured data. Scope every grant by action, resource, and expiry. Revoke or expire automatically when conditions change.
Identity vendors were built for users clicking buttons. SharkAuth was built for agents calling agents calling APIs — with the same RFC-grade rigor.
Some competitors support adjacent pieces — token exchange, token vaults, or machine identities. SharkAuth is the only system where agent delegation is the core model.
We don't have everything yet. SharkAuth v0.1.0 is a focused auth server for agents. We intentionally skipped enterprise baggage (LDAP, SCIM, FIPS, native mobile SDKs) to ship RFC-grade agent primitives first. If you need Active Directory federation or Splunk connectors today, Keycloak or Auth0 is the safer choice. If you need self-hosted agent delegation chains with RFC-native token exchange, DPoP binding, grant_id audit, and cascade revocation in one binary, SharkAuth is purpose-built for that.
Your assistant reads your inbox because you said it could — bound to one DPoP key, scoped to one label, expiring at 5pm.
Orchestrator fans out to a fetcher, a summarizer, a writer. Each link in the chain is signed, scoped, and revocable independently.
Drop the binary next to your app. Get OAuth 2.1, OIDC, SCIM, and an admin UI without a vendor on the critical path.
Every agent action attributable to a human, indexed by grant_id, hash-chained, replayable into your SIEM.
A 29 MB binary on a $5 VPS, talking to a SQLite file. No outbound calls. No phone-home. No "free until we change our mind."
MIT, hash-chained audit, deterministic config. No hidden state. Auditors get receipts. You get to sleep.
