Aegis Authorize
AI agents already initiate B2B payments. The settlement layer still expects a human at the other end of the wire. Aegis is the missing identity primitive. Cryptographic. Scoped. Machine-readable. Banks and rails can accept agent transactions without lighting up every fraud control they have.
Currently in discovery. Taking calls with operators, payers, and issuers who see the same gap.
01 · The problem
Every agent transaction looks like fraud to the existing controls
When an AI agent initiates a payment today, the bank, the issuer, and the rail all see what looks like a human user with anomalous behavior. The agent has no first-class identity, no cryptographically scoped authority, and no machine-readable audit trail. Every agent transaction is one fraud-flag away from being declined.
02 · The thesis
Agents can act. They cannot prove who authorized the action.
The agentic payments stack is being built without an authorization primitive purpose-built for it. Every existing identity standard (OAuth, mTLS, SAML) assumes a human at the end of the chain, or a service account with broad scope. Neither fits.
Aegis is a cryptographic agent-identity layer with scoped delegation, rotating credentials, and rail-readable proofs. It sits between agent frameworks and bank rails, turning every agent transaction into something issuers can underwrite and regulators can audit.
It is rail-agnostic by design, which is why it complements rather than competes with platforms like Finexio Phoenix that need an identity primitive their bank partners can verify across networks.
03 · The product
What it does
Agent identity primitive
Cryptographic identity per agent with rotating credentials, attested by the originating organization.
Scoped delegation
Spend caps, vendor allowlists, and time-bounded authority encoded into the credential itself, not enforced after the fact.
Rail-readable proofs
Issuers and processors verify agent legitimacy without taking custody of the agent or its prompts.
Machine-readable audit
Every agent transaction emits a verifiable record. Compliance, fraud, and regulator readouts are all the same primitive.
04 · Why now
The timing case
- 1
Existing identity standards are being stretched into agent contexts in ways that will create production incidents within twelve months. The market will demand a purpose-built primitive.
- 2
Bank rails are actively looking for ways to authorize agent transactions at scale. Without an identity layer, agentic payments either stay in pilot or run on the wrong primitive.
- 3
AP2, x402, and similar agent-payment protocols are converging on an open spec for the transaction layer. None of them defines the identity layer underneath. The window to set that primitive is the next twelve to eighteen months.
05 · Why I see it
The view from inside the work
I wrote the public thesis on this gap. The Authorization Without Identity essay frames the problem. Federal Reserve, NACHA, and HIMSS contributor work positions the standards conversation.
06 · Comparable references
What's already in the market, and where the gap is
An honest read on the adjacent landscape. Not every comparable is a competitor. Some are partners. Some are the market the venture displaces.
07 · Key risks
What could break the thesis
Operator-grade pre-mortem. Surfaced because the buyers and partners worth talking to will surface them anyway.
Standards bodies move slowly. Aegis could be commoditized by an open spec.
Lead the standards conversation rather than fight it. The reference implementation and the issuer relationships are the moat.
Banks may build proprietary agent-identity layers internally.
Banks have historically bought the cross-rail primitive rather than build it. Aegis is rail-agnostic. A bank-built version locks them into their own walls and into the rail-by-rail integration tax that follows.
Agent fraud incidents could freeze the market early.
Conservative scope defaults and underwriting partnerships from day one. The first incident is when issuers most need a credible identity primitive, not least.
08 · Proof of motion
What I've already shipped on this thesis
The artifacts that turn this from an essay into something with traction. Published work, working-group seats, operator scars.
- Authorization Without IdentityLong-form essay framing the gap, published April 2026.essay
- Federal Reserve faster-payments working-group contributorActive since 2011. Where the standards-body conversation actually happens.advisory
- NACHA + HIMSS working-group contributionsSame operator seat that turns essay into spec.advisory
09 · Questions partners ask
The next three follow-ups
Pre-empted because the buyers and partners worth talking to will surface them anyway.
Is this Finexio's identity layer?
No. Finexio Phoenix is one of the agent platforms that needs an identity primitive its bank partners can verify across networks. Aegis is intentionally rail-agnostic and platform-agnostic. If Aegis succeeds, Finexio benefits as a tenant. If Aegis fails, Finexio still ships, on whichever primitive wins.
Why won't Visa or Mastercard just build this?
They might. They have already started, in the form of Visa Intelligent Commerce Connect and Mastercard Track. Both are rail-specific. Neither solves the cross-rail case where an agent acts across ACH, wire, card, and FedNow inside the same workflow. The category Aegis claims is the cross-rail one.
What about AP2 and other emerging open specs?
Those are transaction-layer protocols. They define how an agent expresses intent and receives a result. They do not define the identity layer underneath. Aegis is a reference implementation of the identity primitive that AP2-style protocols call out to. Different layer of the stack.
What's the first thing you ship?
An attestation primitive plus a reference implementation against one bank rail, with one issuer partner pre-committed to underwrite agent transactions through it. Earliest customers are the bank-platform partnerships at Finexio's adjacency that I know are looking for exactly this.
Status
Aegis Authorize is in discovery. I am taking calls with operators, payers, and issuers who see the same gap, and would talk to capital that wants to be early on the right founder for it.
Other concepts
Healthcare Adjudication
Apex Adjudication
AI claims-resolution engine for healthcare payers. Resolves manual denials at API speed.
Clearinghouse Automation
Clearing AI
Automated translation between legacy clearinghouse formats and modern APIs.
Healthcare Settlement
Ledger Health
Cryptographic settlement and audit trails for multi-party healthcare reimbursement.