The Problem
When AI agents access services on behalf of users, a single question is usually asked:“Did the user consent?” (OAuth)But a second question is equally important:
“Did the service approve this agent?”Without both checks, any agent — including malicious ones — can access any service as long as it tricks a user into consenting.
The Solution: Trusted Handshake
ATH adds app-side authorization (the service approves the agent) on top of user-side authorization (the user consents via OAuth):What can ATH enable?
Secure Agent Access
Agents can access services like email, calendars, and databases — only after both the service operator and the user have approved.
Zero-Change Deployment
In Gateway Mode, service providers need zero changes. The ATH Gateway handles the trusted handshake on their behalf.
Scope Intersection
Even if a user consents to broad permissions, the agent only gets the scopes the service has pre-approved for that agent.
Complements MCP & A2A
ATH provides the trust layer that agent-to-tool (MCP) and agent-to-agent (A2A) protocols currently lack.
Why does ATH matter?
Depending on where you sit in the ecosystem, ATH provides different benefits:| Role | Benefit |
|---|---|
| Agent Developers | Register once, get approved scopes, build with confidence that your agent has verified access |
| Service Operators | Control which agents can access your service, at what scope level, without changing your OAuth setup |
| End Users | Know that the agent accessing your account has been vetted by the service — not just that you clicked “Allow” |
| Enterprises | Audit trail of every agent’s approved capabilities and access patterns |
Protocol Positioning
ATH operates at the application layer, complementing existing protocols:Start Building
Quickstart
Run the reference implementation in 5 minutes
Core Concepts
Understand the architecture and design principles
Build an Agent
Use the ATH Client SDK to connect your agent
Specification
Read the full protocol specification