agntcy-identity

AGNTCY Identity Issuer CLI and Node Backend for managing verifiable agent identities, metadata, and badges.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "agntcy-identity" with this command: npx skills add jadiaconu/agntcy-identity-cli

AGNTCY Identity (Issuer CLI + Node Backend)

Use the identity CLI to create, manage, issue, and verify decentralized agent identities and badges within the AGNTCY ecosystem.

This tool enables:

  • Identity creation (Agents, MCP Servers, MASs)
  • BYOID onboarding (e.g., Okta-based identities)
  • Metadata generation
  • Badge issuance & publishing
  • Verifiable Credential (VC) verification

Requirements

  • Docker Desktop OR
    • Docker Engine v27+
    • Docker Compose v2.35+
  • Optional for demo:
    • Okta CLI
    • Ollama CLI

Core Commands

Vault Management

Manage cryptographic vaults and signing keys:

identity vault connect file -f ~/.identity/vault.json -v "My Vault" identity vault key generate


Issuer Management

Register and manage issuer configurations:

identity issuer register -o "My Organization" -c "$CLIENT_ID" -s "$CLIENT_SECRET" -u "$ISSUER_URL"


Metadata Management

Generate and manage identity metadata:

identity metadata generate -c "$CLIENT_ID" -s "$CLIENT_SECRET" -u "$ISSUER_URL"


Badge Issuance

Issue and publish badges (Verifiable Credentials):

identity badge issue mcp -u http://localhost:9090 -n "My MCP Server" identity badge publish


Verification

Verify published badges:

identity verify -f vcs.json


Running the Node Backend

Start locally using Docker:

git clone https://github.com/agntcy/identity.git cd identity ./deployments/scripts/identity/launch_node.sh

Or:

make start_node


Typical Workflow

  1. Install CLI
  2. Start Node Backend
  3. Create vault + keys
  4. Register Issuer
  5. Generate metadata
  6. Issue badge
  7. Publish badge
  8. Verify badge

Security notes (read before providing secrets)

  • ~/.identity/vault.json can contain signing key material and should be treated as a high-value secret. Use a dedicated test vault for evaluation; do not reuse production keys.
  • CLIENT_SECRET is a high-value secret. Only provide it after you have reviewed the code/binaries you will run and you are operating in a controlled environment.
  • Avoid pasting secrets into chat, logs, tickets, or issue trackers. Prefer secure secret injection.

Notes

  • The CLI binary name is identity.
  • Public issuer keys are exposed via: /v1alpha1/issuer/{common_name}/.well-known/jwks.json
  • Published VCs are accessible via: /v1alpha1/vc/{metadata_id}/.well-known/vcs.json
  • Supports Agents, MCP Servers, and MASs.
  • Follows decentralized identity standards (e.g., W3C DIDs).

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Coding

clawhub-install

Download and install skills from ClawHub directly via curl, bypassing official CLI rate limits. Use when the user wants to install one or more ClawHub skills...

Registry SourceRecently Updated
0199
upupc
Coding

Homebrew Bridge

Expose Mac Homebrew tools like brew, gh, and other /opt/homebrew/bin CLIs on a Linux OpenClaw gateway by installing explicit same-LAN SSH wrappers with optio...

Registry SourceRecently Updated
Coding

Dev Tools Pack

Collection of developer tools including Chrome extension templates, AI code reviews, GitHub README generators, SaaS landing pages, tech blogs, and tweet thre...

Registry SourceRecently Updated