KYE™ — Know Your Entity™. An open vocabulary and contract layer for proving who acted, on whose behalf, with what authority, under what scope, with what evidence — for every action your humans, services, AI agents, models, tools, and workflows take.
KYC tells you who a customer is. KYB tells you who a counterparty is. KYE™ tells you who acted.
Modern systems are run by a swarm of acting entities: humans, service accounts, workloads, AI agents, models, tools, automations, third-party integrations. Every action one of them takes touches a different access-control silo, a different audit log, a different policy engine, a different revocation channel.
When something goes wrong — an agent drifts off-policy, a credential is compromised, a regulator asks "show me who did this and why" — the answers are scattered, partial, and unreplayable.
flowchart LR
subgraph "Without KYE™ — fragmented"
direction LR
A1[Agent action] --> S1[OAuth token]
A1 --> S2[App role]
A1 --> S3[Audit log A]
A1 --> S4[Audit log B]
A1 --> S5[Cache]
S2 -.-> Q1[?]
S3 -.-> Q2[?]
S4 -.-> Q3[?]
S5 -.-> Q4[?]
Q1 --> X[No single answer]
Q2 --> X
Q3 --> X
Q4 --> X
end
The result: revoking an agent takes hours, proving what an agent did takes weeks, and auditing an AI workflow takes a project.
KYE™ unifies the answer. One immutable entity ID per actor. One acting-on-behalf-of delegation per scope. One policy decision per action. One signed audit chain per system. One signal that stops everything in seconds.
flowchart LR
subgraph "With KYE™ — one contract"
direction LR
A2[Agent action] --> G[KYE™ Gateway]
G --> P[PDP / sPDP]
P --> D{Decision}
D -- allow_with_constraints --> E[Execute under scope]
D -- deny / stop / require_approval --> R[Refuse / approval gate]
E --> AUD[Append-only audit chain]
AUD --> PB[Signed proof bundle]
PB --> TS[Transparency receipt]
SIG[Signal: stop / revoke / quarantine] -.-> G
SIG -.-> P
end
KYE™ is not a SaaS, not a replacement for OAuth / OIDC / SPIFFE / VC, not a custodian. It's the contract layer those things plug into so the entire system has consistent, replayable, signed accountability for every governed action.
sequenceDiagram
autonumber
actor Agent as 🤖 Procurement Agent
participant GW as KYE™ Gateway
participant PDP as PDP / sPDP
participant REG as Registries
participant SYS as Billing System
participant AUD as Audit + Proof + Transparency
Agent->>GW: render invoice template
GW->>REG: resolve actor, delegation, scope, credential, attestation
GW->>PDP: authorize(action="document.render")
PDP-->>GW: allow_with_constraints + obligations [audit.emit, redaction.required]
GW->>SYS: render under enforced scope (redaction applied)
SYS-->>GW: rendered invoice
GW->>AUD: append runtime + audit event → proof bundle → transparency receipt
GW-->>Agent: invoice (redacted per scope)
Six months later, an auditor asks: "Why was this rendered?" — KYE™ replays the chain bit-identically, with a signed transparency receipt proving the chain hasn't been edited.
sequenceDiagram
autonumber
actor Sec as 🛡️ Security Admin
participant SIG as Signal Stream
participant GW as Gateways (N)
participant ePDP as ePDP caches (N)
participant SESS as Active Sessions
participant AUD as Audit Ledger
Sec->>SIG: publish entity.stop (target = compromised agent)
par Fan-out within seconds
SIG-->>GW: signal received
SIG-->>ePDP: invalidation push
end
GW->>SESS: invalidate active tokens / sessions
ePDP->>ePDP: refuse cached allow for target
GW->>AUD: append cascade audit events
Note over Sec,AUD: Tier-1 SLO: 30s default, 5s in High-Assurance overlay
No more "we revoked the API key, please wait 24 hours for the cache to expire".
For every governed action, KYE™ standardises how a system answers these — every time, in a portable form:
| # | Question | KYE™ artefact |
|---|---|---|
| 1 | Who is the actor? | immutable entity ID |
| 2 | On whose behalf is it acting? | delegation (subject) |
| 3 | By what authority? | delegation basis + delegator |
| 4 | With what credential or attestation? | credential + attestation refs |
| 5 | What right is being exercised? | action + access right |
| 6 | What scope bounds it? | scope (currency, jurisdiction, env, limits, data classes, obligations) |
| 7 | What resource is targeted? | resource entity ID |
| 8 | What policy decides? | policy bundle version |
| 9 | What obligations attach? | audit.emit, redaction.required, approval.required, … |
| 10 | What stop conditions apply? | delegation.revoked, credential.revoked, attestation.stale, … |
| 11 | What runtime event was emitted? | append-only runtime event |
| 12 | What proof exists? | signed proof bundle + transparency receipt |
If your system can't answer those twelve questions for every action it takes, you don't have entity-level accountability — you have logs. KYE™ is the contract that turns logs into proof.
flowchart TB
subgraph P1["Plane 1 — Identity"]
P1a[Immutable entity IDs]
P1b[Workload attestation - SPIFFE / EAT]
P1c[Credential verification - VC / JOSE / COSE]
end
subgraph P2["Plane 2 — Authority"]
P2a[Acting-on-behalf-of delegation]
P2b[Authority chain]
P2c[Scope intersection]
end
subgraph P3["Plane 3 — Decision"]
P3a[PDP - deny by default]
P3b[ePDP - low-latency local]
P3c[sPDP - sector overlays - Payments, Healthcare, …]
end
subgraph P4["Plane 4 — Execution"]
P4a[PEP at the gateway]
P4b[Obligations enforced]
P4c[Stop conditions monitored]
end
subgraph P5["Plane 5 — Evidence"]
P5a[Append-only audit chain]
P5b[Signed proof bundle]
P5c[Transparency receipt]
end
P1 --> P2 --> P3 --> P4 --> P5
KYE™ specifies the contracts at each plane. Implementations choose their cloud, language, database, and policy engine.
| You are… | KYE™ gives you… |
|---|---|
| A platform building AI agents that act for customers | A way to prove every agent action was authorised, scoped, recorded, and revocable — without inventing the wiring yourself. |
| A regulated SaaS provider (fintech, health, gov, defense) | A pre-built evidence layer that maps directly onto SOC 2, ISO 27001, PCI DSS, PSD2, DORA, GDPR, HIPAA, NIST 800-207, and EU AI Act controls. |
| A bank, fintech, or payments company running agentic workflows | Wallet-bound spend control, dual-approval, signed payment attestations, and replayable proof of every payment authorisation — without becoming a custodian or settlement system. |
| A security or audit team | An append-only, hash-linked, signed audit chain plus signed transparency receipts that prove integrity without the auditor having to trust your database. |
| A standards-aware identity team | A protocol that composes with what you already use (OAuth, OIDC, SPIFFE, EAT, VC, JOSE/COSE, SCITT, GNAP, OpenID SSF/CAEP, OpenID Authorization API, OpenTelemetry) instead of replacing it. |
| An AI-governance team | Per-entity autonomy levels, mandatory signal-driven stop / revoke / quarantine cascades, and policy-decision records that satisfy EU AI Act records-of-processing requirements. |
quadrantChart
title KYE™ control coverage by framework
x-axis "Coverage breadth (low → high)"
y-axis "Coverage depth (low → high)"
quadrant-1 "Strong (broad + deep)"
quadrant-2 "Broad but shallow"
quadrant-3 "Gap"
quadrant-4 "Deep but narrow"
"SOC 2 Type II": [0.85, 0.85]
"ISO 27001:2022": [0.80, 0.75]
"PCI DSS v4": [0.65, 0.80]
"PSD2 / EBA SCA": [0.60, 0.75]
"DORA": [0.75, 0.80]
"GDPR / UK GDPR": [0.70, 0.70]
"HIPAA Security Rule": [0.70, 0.75]
"NIST 800-207 ZTA": [0.85, 0.90]
"EU AI Act": [0.55, 0.65]
Each framework's specific controls are mapped to concrete KYE™ artefacts (schema fields, audit-chain entries, runtime event types, proof bundles). KYE™ is the evidence layer under the customer's certification — it is not itself a certification.
- Stoppable agents. Publish one signal; every Gateway, ePDP, and downstream PEP refuses the next call within seconds.
- Replayable decisions. Any policy decision can be reconstructed at any future date from the append-only chain — bit-identical, with a signed receipt.
- Compliance evidence by construction. The audit chain, proof bundles, and transparency receipts ARE the SOC 2 / ISO 27001 / PCI / DORA / HIPAA evidence. You don't generate evidence — it falls out of doing the work.
- Acting-on-behalf-of as a first-class concept. Delegations are explicit, scoped, time-bounded, revocable, recorded.
- AI-native. Models, prompt templates, guardrails, tools, and memory stores are first-class entities with classifications, attestations, and stop conditions. Autonomy modes are explicit.
- Payments-ready, without becoming the bank. Wallets, payment authorities, intents, approvals, and rail adapters are governed entities; balances, settlement, custody, and clearing stay in your existing payment stack.
- Standards-composing, not replacing. Bring your existing OAuth, OIDC, SPIFFE, VC, OpenAPI, OTEL pipelines.
- Portable. Cloud-agnostic, database-agnostic, language-agnostic.
Three entry points, depending on your role.
flowchart LR
subgraph DEV["Developer / platform team"]
direction TB
D1[Pull vocabulary + ID format] --> D2[Adopt example payloads]
D2 --> D3[Wire KYE™ Gateway into runtime]
D3 --> D4[Plug existing OAuth / SPIFFE / VC]
end
subgraph COMP["Compliance / security / audit"]
direction TB
C1[Adopt audit chain as records-of-processing] --> C2[Use proof bundles as incident artefacts]
C2 --> C3[Hand transparency receipts to auditors]
C3 --> C4[Map artefacts via control-mappings doc]
end
subgraph PROD["Product / business"]
direction TB
B1[Let AI agents act on customer behalf] --> B2[Govern agent payments without becoming custodian]
B2 --> B3[Stop signal halts everything in seconds]
end
You start by adopting the open vocabulary and wire contracts:
- Pull the vocabulary — entity types, relationship types, action names, lifecycle states, obligations, data classes, reason codes
- Adopt the ID format for every entity in your system
- Use the examples as starting templates
Wire a KYE-compliant Gateway into your runtime, pointed at your existing IdP, your existing policy engine, and your existing audit/observability stack. Existing OAuth tokens, SPIFFE workload identities, and W3C VC credentials all plug in.
Start with the evidence story:
- The append-only audit chain is your records-of-processing register (GDPR Art. 30 / SOX / SOC 2 CC8.1)
- Proof bundles are your incident artefacts and your annual-audit handoff
- Transparency receipts are your tamper-detection signal you can point external auditors at
- The control-mappings document maps each KYE™ artefact to specific framework controls
You don't instrument for compliance — KYE™ artefacts are the compliance evidence.
Start with the risk-and-unlock story:
- "Can I let an AI agent act on a customer's behalf?" → yes, with explicit delegation, scope, attestation, and revocation
- "Can I let an agent move money?" → yes, under wallet-bound spend control, dual approval, and signed payment attestations
- "What if the agent goes rogue?" → publish a stop signal; the cascade quarantines the agent, invalidates active tokens, blocks pending workflows, all within seconds
| Asset | License |
|---|---|
| Vocabulary, ID format, illustrative examples | Apache 2.0 — use freely |
| Documentation prose | CC BY 4.0 where indicated |
| Trademarks (KYE™, KYE Protocol™, KYE™ Gateway™, KYE Payments™, KYE Certified™) | reserved |
| Reference runtimes and SDKs | published under their own terms |
| Mechanism specifications | not published in this repository — see Patent notice below |
The Apache 2.0 grant does not include trademark rights. To indicate conformance, participate in the KYE Certified™ program.
| Repository | Contents |
|---|---|
vocabulary |
Stable names: entity types, relationships, actions, lifecycle states, obligations, data classes, reason codes |
id-format |
KYE™ URN identifier format |
examples |
Illustrative JSON example payloads (every public schema covered) |
These three repositories are sufficient to discuss, name, and tool against KYE™. Implementing a conformant runtime requires the normative specification, which is published on a separate track.
KYE™ is a family of profiles, not a monolith.
| Profile | Purpose |
|---|---|
| KYE-Core™ | Entity model, lifecycle, delegation, scope, decision, audit, proof |
| KYE-Gateway™ | Runtime enforcement (PEP) and interoperability |
| KYE-Federation™ | Cross-domain trust + entity transfer |
| KYE-Credentials™ | Credential / presentation packaging (VC + JOSE/COSE) |
| KYE-Attestation™ | Workload + entity attestation (SPIFFE + EAT) |
| KYE-Signals™ | Continuous risk / revocation signaling (SSF/CAEP-compatible) |
| KYE-Transparency™ | Signed statements + inclusion-proof receipts (SCITT-style) |
| KYE-Telemetry™ | Observability semantic conventions (OTEL) |
| KYE-Conformance™ | Machine-testable rules + KYE Certified™ program |
| KYE-Payments™ | Wallets, payment authorities, intents, approvals, rail adapters |
| KYE-Treasury™ (overlay) | Spend programs, allocation, payout batches |
| KYE-Custody™ (overlay) | Custody-provider binding + signing-policy + key ceremonies |
| KYE-Healthcare™ (overlay) | HIPAA + HITECH (break-glass, patient consent, ePHI) |
| KYE-Payments-EU™ (overlay) | PSD2 + EBA SCA RTS |
| KYE-Payments-Card™ (overlay) | PCI DSS v4 |
| KYE-Payments High-Assurance™ (overlay) | Maximum-strictness payments stack |
KYE™ coexists with — does not replace — the standards you already trust:
- NIST SP 800-207 Zero Trust Architecture — KYE™ is the resource-centric posture
- OAuth 2.0 / OIDC / GNAP — token issuance + delegated authorization
- OpenID Authorization API — PDP / PEP exchange compatible
- OpenID Shared Signals Framework / CAEP — signal interop
- SPIFFE / SVID — workload identity bridge
- IETF EAT (RFC 9711) — attestation claim format
- W3C VC 2.0 + JOSE/COSE — credential securing
- SCITT — transparency receipts
- OpenTelemetry semantic conventions — observability vocabulary
- not a SaaS product
- not a replacement for OAuth, OIDC, SPIFFE, EAT, VC, or SCITT
- not a custodian, processor, ledger, or settlement system
- not an opinionated cloud, database, language, or model
KYE Protocol™ is the subject of pending patent applications. The public repositories deliberately publish only the vocabulary, naming, and high-level structure, and do not publish the specific algorithms used to implement the protocol's mechanism layer. Anyone interested in implementing a conformant runtime should contact the maintainers about the normative specification track and the KYE Certified™ conformance program.
- Use the vocabulary, ID format, and examples in your own tooling under Apache 2.0
- Discuss naming and vocabulary in the issues of the relevant public repository
- Conformance — contact the maintainers about the KYE Certified™ program
- Specification access — contact the maintainers about the normative specification track
For collaboration, conformance program participation, or normative specification access, contact the KYE Protocol™ maintainers.
KYE™, KYE Protocol™, KYE Passport™, KYE™ Gateway™, KYE Payments™, KYE Certified™, Know Your Entity™ and the KYE™ logo are trademarks of the KYE Protocol™ maintainers. Use of these marks to indicate conformance requires participation in the KYE Certified™ program.