Authentication

Note: Authentication is under active development and not yet available. There is no authentication system implemented today — no API keys, no JWT tokens, no mTLS, and no operator dashboard. The content below describes the planned authentication model. Check back soon.

All AEGIS platform API requests require authentication. This page covers the supported authentication methods and how to configure them.

API Key Authentication

API keys are the most common authentication method for server-to-server integrations and SDK usage.

Obtaining an API Key

  1. Sign in to the operator dashboard at aegissystems.live (coming soon — the operator dashboard is not yet available)
  2. Navigate to Settings > API Keys
  3. Click Create API Key
  4. Assign a name and select the appropriate permission scope
  5. Copy the generated key — it will only be shown once

Using an API Key

Include the API key in the Authorization header of every request:

curl -H "Authorization: Bearer aegis_sk_live_abc123..." \
  https://api.aegissystems.live/api/v1/governance/propose \
  -X POST -d '...'

With the SDK:

const aegis = new AegisClient({
  endpoint: 'https://api.aegissystems.live',
  apiKey: process.env.AEGIS_API_KEY,
});

API Key Scopes

API keys can be scoped to limit their permissions:

ScopePermissions
governance:proposeSubmit action proposals
governance:readRead governance decisions
audit:readQuery audit logs
capabilities:manageRegister and modify capabilities
policies:manageCreate and update policies
adminFull administrative access

JWT Bearer Tokens

JWT tokens are used for user sessions and dashboard interactions. They are issued by the AEGIS authentication service upon login.

Authorization: Bearer eyJhbGciOiJSUzI1NiIs...

JWT tokens include claims for the authenticated user, their organization, and their roles. Token expiration and refresh are handled automatically by the dashboard and SDKs.

Mutual TLS (mTLS)

For high-security deployments, the platform supports mutual TLS authentication. Both the client and server present certificates, providing cryptographic proof of identity.

mTLS is recommended for:

Contact the AEGIS team for mTLS certificate provisioning.

Security Best Practices

Further Reading