AGNTCY Identity Service serves as the central hub for managing and verifying digital identities for your Agentic Services.
{
"mcpServers": {
"identity-service": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
AGNTCY Identity Service serves as the central hub for managing and verifying digital identities for your Agentic Services. In today's interconnected digital landscape, secure and reliable identity management is paramount. AGNTCY Identity Service addresses this need by providing a streamlined service to:
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
Apache-2.0. View license →
Is it maintained?
Last commit 16 days ago. 61 stars.
Will it work with my client?
Transport: sse. Compatibility not confirmed.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Search, evaluate, and compare 17,000+ MCP servers — each scored on security, maintenance, and efficiency.
AI agents get on-chain identity, credentials, reputation, escrow, and persistent memory on XRPL.
MCP server for scanning and remediating hardcoded secrets using GitGuardian’s API. Detect over 500 secret types and prevent credential leaks before code goes public.
Trust infrastructure for AI agents — DIDs, reputation, verifiable credentials, USDC.
MCP Security Weekly
Get CVE alerts and security updates for Identity Service and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Welcome to the Identity Service repository
AGNTCY Identity Service serves as the central hub for managing and verifying digital identities for your Agentic Services. In today's interconnected digital landscape, secure and reliable identity management is paramount. AGNTCY Identity Service addresses this need by providing a streamlined service to:
Whether you are integrating existing services or deploying new ones, AGNTCY Identity Service ensures that all your components—including MCP Servers, A2A Agents, and OASF—are properly identified, managed and secured.
You can also:
This short guide allows you to setup the Identity Service Frontend as well as the Identity Service Backend.
To run these steps successfully, you need to have the following installed:
Setup OIDC Provider
Create an OIDC application in your OIDC provider.
You can use any OIDC provider of your choice. For testing purposes, you can use Ory, Keycloak or Auth0. Configure the following variables in your shell environment:
export OIDC_ISSUER_URL=<OIDC_ISSUER_URL>
export OIDC_CLIENT_ID=<OIDC_CLIENT_ID>
export OIDC_LOGIN_URL=<OIDC_LOGIN_URL>
export OIDC_CLIENT_ID_CLAIM_NAME=<OIDC_CLIENT_ID_CLAIM_NAME>
where:
OIDC_ISSUER_URL - The URL of your OIDC provider (e.g., https://{INSTANCE_URL}/oauth2/{CLIENT_ID}/.well-known/openid-configuration).
OIDC_CLIENT_ID - The client ID you created in your OIDC provider.
OIDC_LOGIN_URL - The login URL of your OIDC provider (e.g., https://{INSTANCE_URL}/oauth2/{CLIENT_ID}/authorize).
OIDC_CLIENT_ID_CLAIM_NAME - The claim name in the Access token that contains the client ID (default: cid).
📝 NOTE Make sure to add
http://localhost:5500as a redirect URI for your OIDC client.
Or use our demo script to setup a loc