Ohita is a tool that simplifies API key management for AI agents by acting as a central authentication system. It handles token refreshing, rate limits, and other API requirements while supporting bring-your-own-key architecture. The tool includes some pre-configured services and offers a free tier for users to get started.
#authentication
17 items
The DNSID project introduces a unique digital identity system for AI agents, functioning as a "birth certificate" that provides verifiable credentials and establishes provenance for artificial intelligence systems.
FusionAuth's Tenant Manager enables customers to manage their own SSO configurations, reducing support burden for SaaS providers. The feature allows customers to configure identity providers and manage user access independently. This shifts SSO administration from vendor support teams to customer IT departments.
The article discusses security risks associated with long-lived cryptographic keys, explaining why they pose vulnerabilities and recommending shorter key lifespans for better protection. It outlines practical approaches for implementing key rotation and management strategies to enhance security.
A pull request introduces NFC functionality for an open security key on the nRF52480 platform. The implementation enables contactless authentication capabilities for the Solo2 security key project.
The AAuth Protocol is a proposed authentication framework that enables secure authorization across different domains and services. It provides mechanisms for delegated access and token-based authentication while maintaining user privacy and control over their data.
WorkOS FGA provides an authorization layer for AI agents in enterprise deployment, focusing on resource-level permissions to define access scope. While authentication verifies agent identity, authorization determines the permissible actions and data access boundaries.
A developer describes a two-month struggle with Google's OAuth verification process, facing bureaucratic hurdles and unclear requirements. The experience highlights systemic issues with Google's developer support and verification procedures.
The article discusses CIAM (Customer Identity and Access Management) in cloud environments, examining how identity management solutions are evolving for modern digital businesses. It explores the challenges and opportunities of managing customer identities across distributed cloud platforms.
A paying Gemini subscriber reports that both the CLI and codex tools are broken, failing to authenticate or run queries. The user notes there is no way to contact support for either tool.
Better Auth introduces automatic consent tracking features that help developers comply with privacy regulations. The system automatically records user consent for data processing and provides audit trails for compliance verification.
The author has implemented SSH protocol extensions to improve host certificate usability, allowing certificate-based trust instead of individual host keys. The system includes key revocation lists signed by certificate authorities to handle compromised keys. This enables seamless key rotation without user intervention when hosts need to replace compromised keys.
The SSH agent protocol's extension mechanism allows creating arbitrary remote procedure call channels between local and remote systems. This enables custom communication for purposes like forwarding WebAuthn challenges to local authentication methods. The approach involves implementing an extended agent interface and configuring SSH forwarding for specific hosts.
The article examines the lack of a consistent single sign-on API flow, especially for CLI applications. Current methods use vulnerable device code flows or browser-based approaches that don't work well with remote systems. The author advocates for a standardized specification to handle authentication and MFA programmatically.
Keygen has introduced a new, simplified method for authenticating with their software licensing API. The announcement focuses on making license key authentication easier for developers.
The article explains how to implement Time-based One-Time Password (TOTP) two-factor authentication in Ruby on Rails applications using the ROTP gem. It provides a technical guide for developers to add OTP-based second factor security to their Rails apps.
Enterprise AI agents face deployment challenges due to authorization issues, not just authentication. WorkOS FGA provides resource-level permissions to define an agent's access scope and ensure safe enterprise trust.