SIG Protocol alpha·dff0564
Identity for Startups
Authkeep implements SIG — a web-native protocol for publishing cryptographically signed relationship attestations. No proprietary registries, just standard HTTPS.
$ cargo install authkeep-cli
$ ak init-issuer --domain id.authkeep.io
Created .well-known/sig.json
Created .well-known/jwks.json
Created .well-known/did.json
Created .well-known/sig/events.jsonl
$ ak append-upsert \
--issuer "did:web:id.authkeep.io" \
--subject "did:key:z6Mkf1...bot-agent" \
--relationship-type agent --roles read,write
Appended event sequence=1
$ ak check \
--subject "did:key:z6Mkf1...bot-agent" \
--require relationship=agent
allow relationship=agent roles=[read,write]
Ed25519 Verified
JWS Flattened Serialization
Web-Native
.well-known discovery
Solutions
One protocol, every use case
From bot credentials to enterprise compliance — SIG handles signed attestations for any entity type across your organization.
Bots
Credentials for automated systems
Agents
Permissions for AI agents
Humans
Passkeys for real people
Teams
Entitlements for groups
Organizations
Revocation across the organization
Markets
Reputation for digital platforms
Startups
Identity infrastructure from day one
Enterprise
Compliance and audit trails
Defense
High-assurance cryptographic attestation
SIG Protocol
Signed events in, verified state out
Watch the SIG protocol in action — JWS-signed events flow through a deterministic reducer to derive verifiable relationship state.
Open Source
Built in the open.
Verified by everyone.
Authkeep is fully open source. Every line of code, every cryptographic operation, every protocol decision is auditable and verifiable.
6
Rust Crates
9
Use Cases
Ed25519
Signing
100%
Open Source
Start using Authkeep in seconds
Install the CLI and publish your first signed attestation.
$ cargo install authkeep-cli
$ ak init-issuer --domain id.example.com
Created .well-known/sig.json
Created .well-known/jwks.json
Created .well-known/did.json
$ ak append-upsert --subject "did:key:z6Mk..." --relationship-type agent
Appended event sequence=1
$ ak check --subject "did:key:z6Mk..." --require relationship=agent
allow relationship=agent roles=[read,write]
Or read the getting started guide for a full walkthrough.