The canonical registry for the AXIS protocol.
AXIS doesn't decide who to trust. Platforms do.
AXIS provides the trust signal. The ecosystem makes the decisions. The protocol is infrastructure, not policy.
01 Operator Verification Tiers
Operators verify identity at different levels, from email to domain to full business KYB. Each carries a trust signal visible to any platform that queries the registry. Verification tiers are a property of operators, not agents. Agent trust history is captured through Trust Attestations (Layer 3). Receiving platforms decide what operator verification tier they require.
02 Platform Autonomy
Receiving platforms set their own requirements for what trust level they accept. There is no centralized policy. Every platform decides for itself.
03 Portable Signals
Trust signals are portable across the network, not locked to a single platform. Any system that queries the registry can see the operator's verification tier, regardless of which registrar issued it.
04 Separation of Concerns
AXIS separates identity from authorization. The registry proves who an agent is. What that agent is allowed to do is determined by the systems it enters.
Register once. Work everywhere.
AXIS is DNS for agent identity, not another walled garden. Portable agent identity, delegated authority, credential chains, and cross-operator verification.
- Canonical identity per agent with cryptographic keypairs
- Cross-operator verification via signed attestations
- Delegation and authorization chains
- Liability clarity through cryptographically signed delegation chains
- Compatible with W3C Decentralized Identifiers (DIDs)
- Cryptographic primitives follow NIST recommendations
- Security model inspired by DNSSEC hierarchical trust
- No vendor lock-in. No licensing fees. Apache 2.0.
Trust Attestations are signed records. Aggregation, scoring, and evaluation of attestations is out of scope for v0.1 and planned for v0.2.
W3C DID
Compatible with Decentralized Identifiers. Agent identities resolve through standard DID methods.
NIST
Cryptographic primitives follow NIST recommendations. Key generation, signing, and verification use vetted algorithms.
DNSSEC
Security model inspired by the hierarchical trust framework that secures the internet's naming system.
The scope field in delegation credentials uses an open namespace. AXIS v0.1 uses out-of-band scope negotiation. AXIS v0.2 will introduce standard common scopes, namespaced custom scopes, and a discovery endpoint at /.well-known/axis-scopes.
The registrar model
AXIS Prime is the canonical registry. Registrars handle all end-user registration, pricing, and verification. Any accredited registrar can register agents into the AXIS network. Agents registered through any registrar are interoperable across the entire network.
AXIS Prime
Canonical registry. Stores identity records and credential chains. Backend infrastructure.
Registrars
Accredited operators that handle agent registration, identity verification, and pricing.
Platforms
Read from the registry. Set their own trust requirements. Accept or reject agents based on credentials.
Interested in becoming a registrar? Learn about accreditation →
Register your first agents
AXIS Prime does not handle registration directly. Agents are registered through accredited registrars.
Kipple Labs builds infrastructure for autonomous AI agent systems and operates the first AXIS registrar. Registration, verification, pricing, and developer tooling are handled through their platform.
Register agents at Kipple Labs → Visit kipplelabs.com →Open infrastructure requires independent governance.
Extracted from production.
Kipple Labs
Build on AXIS.
The protocol is open. The spec is on GitHub. Contributions are welcome.