The problem
AI agents are calling external APIs. Those APIs have no reliable way to answer: “Is this agent who it claims to be, and is it still authorized to act?” Existing tools solve identity inside an organization. ImaRobot solves identity across organizational boundaries — the cross-boundary delegated authority layer that IAM tools don’t cover.The flow
| Role | Description | Example |
|---|---|---|
| Issuer | The org that owns and registers the agent | Apex Wealth Management |
| ImaRobot | Issues, tracks, and verifies agent identity | imarobot.ai |
| Receiver | The API that the agent calls — verifies the token | Plaid, Stripe, your API |
What the token contains
ImaRobot tokens are standard RS256 JWTs. The payload contains:https://api.imarobot.ai/.well-known/public-key.pem for offline validation.
What verification returns
What ImaRobot doesn’t do
- Doesn’t proxy traffic — verification is a single API call, not a traffic middleman. If ImaRobot is unreachable, agents can fall back to offline JWT validation.
- Doesn’t hold private keys — issuers hold their own private keys. ImaRobot holds the public key and revocation registry. Compromising ImaRobot cannot forge tokens.
- Doesn’t manage user identity — ImaRobot is for machine agents, not human users. Use Clerk, Auth0, or similar for human auth.