Skip to content

Nexus

Auth infrastructure for autonomous agents.

One authority for every service your agents touch. Nexus orchestrates provider connections, token lifecycle, agent identity, scoped sessions, and on-behalf-of delegation — your agents never write auth code or hold a raw secret.


What Nexus does

Every agent that connects to an external service hits the same wall. OAuth flows, token refresh loops, credential rotation, per-provider auth implementations — all of it written from scratch, per integration, per team. Nexus eliminates that wall entirely.

Register a provider once. Every agent in your fleet connects to it through a single authority. The Broker handles the OAuth handshake, encrypts the token at rest, runs the refresh loop, and issues only a short-lived credential when an agent asks. The agent uses it and discards it. If the agent is compromised, the attacker has nothing durable.

Beyond the OAuth layer, Nexus covers the full auth surface that production agent systems require. Agents are registered principals with declared scope ceilings — a crm-agent registered with crm:contacts:read cannot request crm:delete, even if the underlying connection has that scope. When a human user triggers an agent mission, the Broker validates the user's permission, stamps the session with their identity and tenant context, and enforces data isolation across every downstream operation. Internal business operations — acme:gliding, pipeline:trigger — are first-class scopes enforced at the same authority as OAuth tokens. Every credential request, session open, and session close is logged in a tamper-evident audit trail.

Broker

The authority. Holds all master secrets encrypted at rest. Runs the background refresh loop. Never exposed to agents directly.

Gateway

The public API. Agents call the Gateway. It proxies to the Broker over an internal channel. Agents never reach the Broker.

Bridge

The Go library. Runs inside your agent process. Fetches credentials and injects them into outgoing HTTP and gRPC requests automatically.

SDKs

Three first-class clients. Go, TypeScript, and Python. Direct Gateway access for explicit credential fetches and MCP server integration.


Quick start

cp .env.example .env
# Generate ENCRYPTION_KEY and STATE_KEY — see Getting Started
make up

Broker runs on localhost:8080. Gateway runs on localhost:8090.


Where to start

Start with Architecture under the Concepts tab. It establishes the control plane and data plane split, the OAuth handshake flow, and the credential retrieval model. Every other page assumes that mental model.

Then follow Deploy in Five Minutes to run a stack and make your first connection. After that, the Guides cover the operational tasks you return to repeatedly.


Explore

Source Browse the code, open issues, and submit PRs — GitHub
OpenAPI The full Gateway v1 contract — openapi.yaml
Community Questions, showcases, and early feature previews — Discord
Blog Engineering deep-dives and architecture walkthroughs — read the blog