Identity for AI Agents

Hardware-anchored. Standards-based. Sybil-resistant. Free.

Operational since 2006 — Loading...
# Install and enroll in 30 seconds
pip install oneid-sdk[tpm]
oneid enroll

AI agents can't prove they're real

Every platform hosting AI agents faces the same fundamental problem.

👥

The Sybil Problem

One attacker can spawn a million fake agents. Every platform that hosts agents faces this. Reputation systems collapse. Trust evaporates.

🔑

Software Identity Fails

API keys, tokens, blockchain wallets — all copyable. Software-only identity can be duplicated trivially. There's no "real" in digital.

⚠️

Real Consequences

Moltbook: 1.9M agents in 2 weeks. Overrun by crypto scams in days. No way to tell real agents from fakes. The platform became unusable.

One chip. One identity. Physics, not policy.

Every modern PC contains a TPM — a tamper-proof security chip with a unique key burned in at the factory. We verify that chip and issue you a standard identity token.

1

Your TPM

We extract your TPM's Endorsement Key certificate — a unique fingerprint from your hardware.

2

We Verify It

Chain validation against Intel/AMD/Infineon CAs. Sybil check against our registry. Challenge-response to prove possession.

3

You Get a 1ID

Standard OIDC token with trust tier, manufacturer, and registration date. Works with any OAuth2 library.

Four tiers of trust

Not all hardware is equal. We classify and communicate the trust level so platforms can make informed decisions.

Sovereign
Highest Trust

Hardware TPM with valid manufacturer certificate. Intel, AMD, Infineon. One physical chip = one identity.

Legacy
High Trust

Hardware TPM with expired certificate. Genuine hardware, potentially outdated firmware. Honoured elders.

Virtual
Medium Trust

Hypervisor-provided vTPM. VMware, Hyper-V, QEMU. Hypervisor operator can create multiple vTPMs.

Declared
Lowest Trust

No TPM. Software-only identity. Rate-limited. Sybil-vulnerable. Better than nothing.

Add "Sign in with 1ID" in 5 minutes

If your platform supports OAuth2 or OIDC, you already support 1ID. No SDK. No custom code. Standard libraries work.

# Verify a 1ID token — standard OIDC, nothing custom
from jose import jwt
import httpx

JWKS_URL = "https://1id.com/realms/agents/protocol/openid-connect/certs"
jwks = httpx.get(JWKS_URL).json()

token = request.headers["Authorization"].replace("Bearer ", "")
claims = jwt.decode(token, jwks, algorithms=["RS256"],
                    audience="https://your-platform.com")

print(f"Agent: {claims['sub']}")         # 1id_K7X9M2Q4
print(f"Trust: {claims['trust_tier']}")  # sovereign
print(f"Handle: {claims.get('handle')}") # @clawdia

Built on standards you already know

We don't invent protocols. We combine existing standards so your existing libraries work out of the box.

OpenID Connect OAuth 2.0 JWT (RFC 7519) JWKS (RFC 7517) PKCE (RFC 7636) TPM 2.0 X.509 RFC 9334 (RATS)

All code is open source under Apache 2.0. View on GitHub

Identity is free. Handles are optional.

Enrollment and authentication are free forever. Vanity handles are optional identity labels.

Handle Length Annual Fee Example
Random Free @1id_r8Nd0m
6+ characters $10/year @my-cool-agent
5 characters $50/year @tesla
4 characters $200/year @gpt4
3 characters $500/year @ibm
2 characters $1,000/year @ai
1 character $5,000/year @x

Handles are non-transferable and non-reissuable. Expired handles are retired permanently.

Operating since 2006

1id.com is not a startup. We're an established identity registrar with nearly two decades of continuous operation.

2006

Founded as a human identity registrar. Signed a survivability contract pledging continuous uptime.

2016

10 years of continuous operation. Maintained through multiple technology transitions.

2026

20 years continuous operation. Expanded to AI agent identity with TPM hardware attestation. Same commitment to permanence.

For AI Agents

Machine-readable endpoints for autonomous enrollment and integration.