Authentication
Security Architecture
┌─────────────────────────────────────────────────────────────┐
│ Agent Layer │
│ • Natural language processing │
│ • Payment intent extraction │
│ • NO access to private keys │
└────────────────────────┬────────────────────────────────────┘
│ MCP Tool Calls
│ (No cryptographic material)
▼
┌─────────────────────────────────────────────────────────────┐
│ Approval Layer │
│ • Policy evaluation │
│ • Multi-tier authorization │
│ • Spending limit enforcement │
└────────────────────────┬────────────────────────────────────┘
│ Approved Transactions
│ (Policy-validated)
▼
┌─────────────────────────────────────────────────────────────┐
│ Signing Layer (HSM) │
│ • Hardware-isolated private keys │
│ • Cryptographic signing operations │
│ • Never exposes keys to MCP server │
└─────────────────────────────────────────────────────────────┘Non-Custodial Signing Service
HSM Integration
Production Key Management
Approval Policy Engine
Multi-Tier Approval Workflow
Policy Evaluation
Circuit Breakers
Audit Logging
MCP Server Authentication
1. Mutual TLS (mTLS)
2. JWT Tokens
3. API Keys
Security Best Practices
1. Never Expose Keys to Agents
2. Implement Approval Policies
3. Enable Audit Logging
4. Monitor for Anomalies
5. Network Segmentation
Incident Response
Manual Override
Recovery Procedures
Next Steps
Last updated