Skip to content
API Reference

Supported Standards & Protocols

Every protocol, standard, and interface supported by Keycard - available on all plans

Every protocol listed here is available on every plan. Nothing is gated by tier.

OAuth 2.1 is the core authorization framework. Keycard supports Dynamic Client Registration (agents and applications register as OAuth clients at runtime), Registered Clients (pre-configured with known credentials), and Client ID Metadata (attach metadata to identities for policy evaluation).

Token Exchange (RFC 8693) swaps one token for another with different permissions, scope, or audience. This is how agents move between applications with least-privilege access - trading a broad token for one scoped to what they actually need.

Token Brokering translates tokens from external identity providers into Keycard-managed tokens. Brokered tokens let agents access resources where Keycard handles the initial authorization but stays out of the ongoing request path.

SPIFFE (Secure Production Identity Framework for Everyone) gives workloads cryptographic identity. Keycard issues and validates SPIFFE IDs (SVIDs) so workloads can authenticate to each other without shared secrets.

WIMSE (Workload Identity in Multi System Environments) extends this across organizational and cloud boundaries - for cases where agents need to authenticate across trust domains.

MCP (Model Context Protocol) handles agent-to-tool communication. Keycard protects MCP tool calls by issuing and validating tokens per interaction and enforcing policy on which tools an agent can reach.

A2A (Agent-to-Agent) handles agent-to-agent communication. Keycard authenticates both sides and enforces policy on what each agent can do to the other.

Interface
REST APIProgrammatic access to zones, applications, policy, identity providers, and telemetry. API Reference →
CLIManage configuration, deploy policy, and debug token flows from the terminal.
SDKsClient libraries for OAuth, MCP, and agent integration.
TerraformManage Keycard resources as code. Provider docs →
Agent Built ToolsAgents can register their own tools in Keycard, subject to the same identity, policy, and telemetry controls as anything else.

Keycard works with any identity provider that speaks a supported standard: OAuth 2.1, OIDC, SAML, SPIFFE, or WIMSE.

Examples
CloudAWS IAM, Azure Entra ID, Google Cloud IAM
EnterpriseOkta, Auth0, Ping Identity, OneLogin
On-premActive Directory, LDAP
CustomAnything that implements a supported standard

The catalog has pre-built configurations for common providers. For everything else, configure using the standards above or the SDKs.

See Security for the full encryption model and key management details.

StandardUse
TLS 1.3Transit encryption
ChaCha20Secret materials at rest
ECDSA P-256JWT signing
AES-256AWS KMS envelope encryption
JWT (RFC 7519)Token format
JWK (RFC 7517)Public key distribution via JWKS endpoints