XentraNET Identity Platform

Identity for humans
and the agents
they deploy.

X-Auth is the identity platform for the AI era. Risk-based authentication for your users. Scoped, pooled identities for your AI agents. One platform. Two products. Zero shared service accounts.

x-auth — frontend advice(), backend verify()
import { XAuth } from '@xentranet/x-auth';

const xauth = XAuth.init({ tenantId: 'your-app' });

// Frontend — advice() runs any required OIDC step-up and returns
// a transaction-scoped access_token, bound to this exact action.
const { decision, access_token } = await xauth.advice({
  action: 'transfer', amount: 2999, currency: 'USD',
});

if (decision === 'ALLOW') {
  fetch('/api/transfer', {
    headers: { authorization: `Bearer ${access_token}` },
  });
}

// Your backend — verify() echoes back the bound transaction_ctx.
// `expect` asserts the token matches THIS action (or it throws).
const { transaction_ctx } = await xauth.verify(bearer, {
  expect: { action: 'transfer', amount: body.amount },
});
The Threat
29%
of U.S. adults experienced account takeover in 2024
80%+
of data breaches involve compromised credentials
The Solution
Zero
instances of unauthorized access reported by X-Auth clients
The ROI
>60%
reduction in helpdesk costs for organizations on XentraNET
The Platform

One Platform.
Two Products.

X-Auth solves identity twice — once for the humans using your app, and once for the AI agents acting on their behalf. Shared risk engine. Shared console. Separate plans.

X-Auth for Apps

Risk-based OIDC,
in five lines.

Drop-in OIDC provider with a live risk score on every request. Your users glide through when trusted, get challenged when they shouldn't be.

  • Passkeys, WebAuthn, FIDO2, magic links
  • Continuous, signal-driven step-up
  • Policy engine with sensitivity-aware overrides
  • Integration as simple as social login
› see how it works
X-Auth for Agents

Real identities
for your AI agents.

An MCP-native identity broker. Every MCP connection is bound to a scoped, revocable identity from a pool you control — no more shared service accounts or over-scoped keys.

  • Define personas (pre-authorized claim bundles)
  • Provision identity pools per workload
  • Install mcp.x-auth.com, pick a persona, OIDC does the rest
  • Audit every connection, revoke in one click
› see how it works
Product 01 · For Apps

Authenticate your users
without scaring them.

Risk-based OIDC for the humans using your app. Seamless access for the trusted, hard stops for the rest.

The Problem

Don't Scare Your
Customers Away

Static authentication treats every login the same. That's not security — it's friction theater.

"Why are you asking for an SMS one-time code when I just want to log in and check my debit balance from the same home computer I use every single time?"

That's your customer. Frustrated. Abandoning your app. Traditional authentication blasts every user with MFA hurdles regardless of how well you know them.

Dynamic, risk-based authentication changes that. X-Auth evaluates a live trust score on every request — device reputation, behavioral patterns, location, and network signals — continuously, not just at login. As part of a Zero Trust framework, every access attempt is verified in real-time.

Legitimate users glide through. Threats get stopped. Make accessing your system a low-friction experience for the good citizens of the internet, and a wall for everyone else.

Risk-Based Authentication

The Right Response
for Every Risk Level

X-Auth evaluates both the identity signals behind a request and the sensitivity of what's being accessed — then matches the friction to the actual risk.

LOW RISK

Seamless Access

e.g. login request for read-only access — trusted identity signals and low-sensitivity operation.

  • Trusted device fingerprint
  • Recognized IP & location
  • Consistent behavioral pattern
  • Low-sensitivity resource
✓ Instant access granted
MEDIUM RISK

Soft Step-Up

e.g. report generation for sensitive data — elevated sensitivity or mild identity signal deviation.

  • Unrecognized browser or OS
  • Access outside normal hours
  • Sensitive resource requested
  • Moderate anomaly score
→ SMS OTP, magic email link, or FIDO2
HIGH RISK

Strong Step-Up

e.g. payment attempt — high-value operation, suspicious signals, or both.

  • High-value or irreversible action
  • Unknown device or flagged IP
  • Behavioral anomaly detected
  • Credential stuffing pattern
⛔ Push or FIDO2 with knowledge or possession factor
Intelligence Engine

Every Signal.
Evaluated in Real-Time.

X-Auth ingests four categories of signals continuously to build a live trust score for every session — not just at login.

🖥

Device Reputation

Each device is fingerprinted and scored against historical fraud patterns and browser entropy. New or anomalous devices are flagged before a credential is ever entered.

device fingerprint fraud history browser entropy
🧠

Behavioral Biometrics

AI/ML models build a behavioral baseline for each user — typing cadence, mouse dynamics, touch pressure, and navigation patterns. Deviations trigger escalation automatically.

typing cadence mouse dynamics touch pressure AI/ML
🌐

Network Risk

IP reputation, geo-fencing, traffic velocity analysis, VPN detection, and Tor exit node identification guard against proxy abuse and distributed credential attacks.

IP reputation geo-fencing VPN detection Tor detection
👤

User Behavior

Session duration, access times, resource access patterns, and privilege escalation attempts are monitored continuously throughout the session — not just at login.

anomaly detection continuous auth privilege monitoring
Core App Services

Advice, Authentication,
Risk — All Three.

One universal endpoint evaluates risk for any journey. Authentication and authenticators execute step-up when the answer is "prove you're you."

Universal Risk Advice

One endpoint — POST /v1/advice — protects any journey. Login, checkout, transfer, profile change, sensitive read: send a transaction_ctx and a device_ctx, get back ALLOW, STEP_UP with a required ACR, or DENY. No flow-by-flow integration.

/v1/advice transaction_ctx device_ctx ACR-aware multi-tenant

Adaptive Authentication

A full OIDC provider with risk-aware step-up. When /v1/advice returns STEP_UP, the authenticator service dispatches the right challenge — passkey, push, TOTP, SMS, or magic link — and the session is upgraded with the achieved ACR.

OIDC Passkeys / FIDO2 TOTP Push SMS Magic Link

Risk Intelligence

Signal aggregation and policy engine behind every advice call. Ingests device, behavioral, network, and user signals; weighs them against tenant policy and resource sensitivity; returns a tier — low, medium, high — with a per-tier decision.

Signal Aggregation Tenant Policy Risk Tiers Zero Trust
Product 02 · For Agents

Your agents deserve
their own identities.

An MCP-native identity broker at mcp.x-auth.com. Real, scoped, revocable identities for every agent you deploy.

The Agent Identity Crisis

Shared Keys.
Blast Radius.

Your AI agents are running with credentials they shouldn't have — and you have no audit trail when things go wrong.

"Which agent made this API call? Under whose authority? With what scope? And how do I revoke just that one without breaking the others?"

That's your security team. Staring at a shared service account used by a dozen agent workloads. One prompt injection away from a breach. One audit query away from a compliance finding.

Today's agents check into systems using credentials borrowed from humans, API keys with superuser scope, or a shared service account that can't be scoped down without breaking something. None of that is identity — it's a backdoor with a sticker on it.

X-Auth for Agents gives every MCP connection a real identity, pre-scoped to the minimum claims it needs, drawn from a pool you manage. Revoke one without touching the others. Audit every connection. Sleep at night.

How It Works

Personas. Pools.
One MCP Install.

Three primitives. Define once in the X-Auth console, consume from any AI chat or agent runtime.

STEP 01

Define Personas

A persona is a pre-authorized bundle of claims — OAuth scopes, entitlements, attributes. Defined once by your security team, reused across every agent that takes on that role.

persona: "crm-reader"
scopes:
  - crm.contacts.read
  - crm.accounts.read
ttl: 15m
STEP 02

Provision Identity Pools

An identity pool holds concrete agent identities eligible to assume one or more personas. Size the pool to your workload. Assign, rotate, revoke — per-identity, without collateral damage.

pool: "support-desk-agents"
size: 25
personas:
  - crm-reader
  - tickets-writer
STEP 03

Install. Pick a Persona. OIDC.

The AI chat owner installs mcp.x-auth.com as a tool and picks the persona they need. A standard OIDC handshake runs — X-Auth binds an identity from the pool and grants exactly the scopes the persona authorizes. The connection embodies that identity for its lifetime.

install: mcp.x-auth.com
persona: crm-reader
handshake: oidc
scopes:
  - crm.contacts.read
  - crm.accounts.read
# → identity bound, tokens issued
Broker Capabilities

Every Agent.
Its Own Identity.

The broker handles the identity lifecycle so your agent runtime doesn't have to. MCP-native from day one.

🪪

Persona Templates

Codify the OAuth scopes and claim bundles your agents are allowed to assume. Version them, review them, sign them. Your security team owns what "agent authority" means — the agents don't negotiate it at runtime.

OAuth scopes claim bundles policy-as-code
🏊

Identity Pools

Real, concrete identities — not stamped-out JWTs. Assign pool size to workload volume, set per-identity TTLs, rotate or retire individuals without taking down the fleet. Scope each pool to one or more personas.

per-workload pools individual rotation blast-radius limiting
🔌

MCP-Native Delivery

Install mcp.x-auth.com as a tool in Claude, ChatGPT, Cursor, or any MCP-aware runtime. Pick a persona at install — the OIDC handshake binds an identity from the pool. If your runtime supports DCR (Dynamic Client Registration) or CIMD (Client Identifier Metadata Document), install is truly zero-config — no manual client provisioning, no copy-pasted secrets.

DCR CIMD OIDC Claude · ChatGPT · Cursor
📜

Audit & Revocation

Every MCP connection is logged with the requesting runtime, the selected persona, the pool, and the bound identity. Revoke a live connection mid-session. Trace any downstream API call back to the exact agent, persona, and time window.

per-connection log instant revocation forensic trace
Compliance & Trust Center

Built for Regulated Industries

From fintech startups to enterprise infrastructure — X-Auth is the foundation of digital trust.

SOC 2 Type II ISO 27001 GDPR Ready HIPAA Compliant PCI DSS
Zero

instances of unauthorized access reported by X-Auth clients

Pricing

Start Free.
Scale Confidently.

No credit card required on either product's Developer tier. Pick the surface you're starting with — or use both.

X-Auth for Apps

Human identity, billed by MAU.

Risk-based OIDC for the users of your app. All tiers include the full risk engine.

Developer
Free forever
For side projects and early-stage MVPs. Up to 5,000 MAU.
  • Up to 5,000 monthly active users
  • Risk-based authentication
  • Passwordless & social login
  • Basic RBAC
  • Community support
Get Started Free
Enterprise
Custom / yr
Dedicated infrastructure, custom throughput, and 24/7 security response.
  • Dedicated cluster deployment
  • Custom risk policy engine
  • SSO & SCIM provisioning
  • Compliance reporting
  • SLA guarantees
  • 24/7 security response team
Contact Sales
X-Auth for Agents

Agent identity, billed by pool & personas.

Provision real identities for your AI agents. Tiers scale on concurrent agent identities, distinct personas, and MCP installs.

Developer
Free forever
For exploring MCP-based identity brokering and small personal agents.
  • 2 concurrent agent identities
  • 2 personas (claim bundles)
  • Up to 2 MCP installs
  • Basic audit log (7-day retention)
  • Community support
Get Started Free
Enterprise
Custom / yr
For regulated deployments needing dedicated broker infrastructure and custom policy controls.
  • Unlimited identities & personas
  • Dedicated broker cluster
  • Private MCP endpoint & mTLS
  • SIEM audit export
  • SSO admin, SCIM, policy-as-code
  • 24/7 security response team
Contact Sales
Get in Touch

Ready When You Are.

Free-tier signups, sales questions, security reviews — we reply the same business day.

Your email client will open with a pre-filled message.

Sales
sales@x-auth.com

Pricing, onboarding, proofs-of-concept — or just a quick question before you sign up.

Security

Found a vulnerability? Disclose privately to security@x-auth.com. PGP key on request.

Enterprise & Regulated

Dedicated-cluster deployments (SOC 2, ISO 27001, HIPAA, PCI DSS), SSO/SCIM, and 24/7 security response. Start an enterprise conversation →