Level 1: Gateway Mode (Zero Service Changes)
| Aspect | Detail |
|---|---|
| App-side authorization | ATH Gateway checks agent against its registry |
| User-side authorization | Standard OAuth via the gateway’s OAuth bridge |
| Service provider effort | None |
| Best for | Immediate deployment, proof of concept |
Level 2: Agent-Aware OAuth (Minimal Service Changes)
Services extend their existing OAuth client registration to include ATH agent metadata:| Aspect | Detail |
|---|---|
| App-side authorization | Service reviews agents via existing developer console + agent metadata |
| User-side authorization | Standard OAuth with agent context shown on consent page |
| Service provider effort | Add ath_* fields to client registration, update consent page |
| Best for | Popular services that want tighter control over agent access |
Level 3: Native ATH (Full Implementation)
Services implement ATH endpoints directly:.well-known/ath-app.jsondiscovery- Agent registration with capability-level approval
- Scope intersection enforcement
- Agent-aware consent pages showing trusted handshake status
| Aspect | Detail |
|---|---|
| App-side authorization | Full per-agent, per-capability approval with scope intersection |
| User-side authorization | Enhanced consent page showing which capabilities the service has approved |
| Service provider effort | Full ATH implementation |
| Best for | Long-term goal for major platforms |
Choosing Your Level
Level 1
Start here. Deploy a gateway, protect existing services immediately.
Level 2
Upgrade when you want service-side visibility into agent registrations.
Level 3
Full native support for maximum security and user transparency.