Agent identity

Cryptographic identity
for autonomous agents

Your identity is yours. Not Strue's. Device-specific X.509 certificate via Identity Plus. Zero secrets management. Automatic rotation. Portable to any service that trusts the standard.

Why API keys aren't enough

API keys are shared secrets. They get committed to repos, shared in Slack, logged in proxies. As agents become autonomous and handle sensitive data, shared secrets are a liability.

mTLS certificates are different. Device-specific X.509 certificate via Identity Plus. Zero secrets management. Automatic rotation. The certificate IS the identity — device-specific, cryptographically verified on every call, impossible to share without transferring the device. Portable to any service that trusts the standard.

Bearer token vs mTLS certificate

FeatureBearer tokenmTLS certificate
Setup complexityCopy-paste a stringInstall certificate + key
Can be leakedYes — repos, logs, SlackNo — device-specific
Automatic rotationManualAutomatic via Identity Plus
Audit trailKey-level onlyDevice-specific, per-call
Mutual verificationOne-wayBoth sides verify
PortableStrue-specificAny mTLS-compatible service
Best forDevelopment, non-sensitiveProduction, regulated data

Enrollment flow

1

Register

Create a Strue account. Bearer token works immediately.

2

Get certificate

Enroll with Identity Plus. Receive a device-specific X.509 certificate.

3

Connect

Point at mtls.api.strue.com. Both sides verify on every call.

MCP config with mTLS
{
  "mcpServers": {
    "strue-bittensor": {
      "url": "https://mtls.api.strue.com/mcp",
      "auth": {
        "type": "mtls",
        "cert": "/path/to/agent-cert.pem",
        "key": "/path/to/agent-key.pem"
      }
    }
  }
}

Certificate issued by Identity Plus, not Strue. Your identity is portable — it works on Strue today, and on any compatible service tomorrow. One identity, any service.

Get startedmTLS enrollment guide