Documentation Index
Fetch the complete documentation index at: https://mintlify.com/PaymanAI/sigilum/llms.txt
Use this file to discover all available pages before exploring further.
Overview
The verification endpoint provides a fast lookup to check whether an agent (identified by public key) is currently authorized to access a service within a namespace. This is the primary runtime authorization check used by services to validate incoming requests.Verify Agent Authorization
Check whether a public key is currently approved for a service/namespace pair.
Query Parameters
Namespace identifier to check authorization against.Example:
acme-corpAgent’s Ed25519 public key (format:
ed25519:<base64>).Example: ed25519:LS0tLS1CRUdJTi...Service slug to check authorization for.Example:
my-serviceResponse
Whether the agent is currently authorized.
true- Agent has an active approved authorizationfalse- Agent is not authorized (pending, rejected, revoked, or never requested)
Claim identifier (only present when
authorized: true).ISO 8601 timestamp when authorization was approved (only present when
authorized: true).Human-readable reason when
authorized: false.Examples:"No approved authorization found""Authorization revoked""Authorization pending approval"
Example: Authorized Agent
Example: Using JavaScript SDK
Performance Considerations
Caching Strategy
For high-volume services, consider caching verification results locally:- Initial Load: Use
GET /v1/namespaces/claimsto bulk-load all approved authorizations - Local Cache: Store results in Redis, in-memory cache, or local database
- Incremental Updates: Subscribe to webhooks for real-time authorization changes
- Fallback: Query
/v1/verifyon cache miss
Example Caching Flow
Error Responses
| Status | Code | Description |
|---|---|---|
| 400 | INVALID_REQUEST | Missing or invalid query parameters |
| 401 | SIGNATURE_INVALID | Invalid or missing signed headers |
| 503 | SERVICE_UNAVAILABLE | Database unavailable |
Integration Patterns
Middleware Pattern
Integrate verification as middleware in your API:Gateway Pattern
Use the Sigilum Gateway to handle verification automatically:- Extract agent credentials from requests
- Verify authorization (with caching)
- Add authorization context to upstream headers
- Block unauthorized requests
Security Considerations
Replay Protection
Even for GET requests, signed headers include a nonce to prevent replay attacks. Each verification request requires a unique nonce.Subject Verification
Thesigilum-subject header in the signed request should match your application’s authenticated user. Use this to prevent privilege escalation:
Public Key Rotation
When rotating agent keys:- Submit new authorization request with new key
- Wait for approval
- Update agent configuration to use new key
- Optionally revoke old authorization