For AI startups
Ship agent auth in an afternoon
One API key per agent is not a plan. Scoped delegation, audit, and revocation without a platform team.
00/Use cases
Every team hitting KavachOS has one of five shapes of problem. Pick the closest to yours. Each page shows the concrete primitives we ship and the audit question they answer.
01/Pick the shape
The primitives are the same. The emphasis shifts. Agents need delegation. MCP servers need OAuth 2.1. SaaS teams need orgs. Enterprises need evidence. Pick the lens that matches today.
For AI startups
One API key per agent is not a plan. Scoped delegation, audit, and revocation without a platform team.
For MCP servers
RFC 9728, RFC 8414, RFC 7591, PKCE S256. All of it, edge-native. Point your resource server at the issuer and go.
For SaaS platforms
Organizations are free. SAML, OIDC, and SCIM 2.0 ship on the Growth plan. No per-org fee, no enterprise upsell for a checkbox.
For Multi-agent systems
Every hop carries a parent, a scope subset, and an audience. The audit tree answers which agent did what.
For Enterprise
Tamper-evident audit, SAML and SCIM, EU AI Act Article 13 coverage. Self-host in your VPC or use the managed cloud.
02/The common thread
The primitives do not change when the use case changes. Subjects, scopes, delegation, audit. What changes is which corner of the graph you spend time in.
Subjects
Scopes
Delegation
Audit
If a use case does not reduce to subjects, scopes, delegation, and audit, it probably does not belong in an auth library. We kept the surface small on purpose.