Identity
The request is bound to a known user or tenant.
The Control Layer is what turns credentials into governable runtime behavior. A token can exist and access can still stop. That is intentional. Identity, entitlement, commercial state, and policy all participate in the final decision.
Last updated: March 9, 2026
Each request passes through an explicit chain. That is why approval requirements, blocked states, and recovery paths stay legible instead of hiding inside prompt behavior.
The request is bound to a known user or tenant.
Commercial, legal, and access state are checked live.
Rules decide whether work runs, pauses for review, or stops.
Only approved workflow actions reach the connected system.
Every outcome leaves a reason trail for support and review.
Blocked states are product behavior. Each one needs a clear reason and a recovery path so support, buyers, and operators see the same reality.
The account is real, but the service has not been granted for this tenant.
Grant or activate the package before token or host access resumes.The credential exists, but the operating agreement no longer allows execution.
Renew or restore the contract state before writes resume.Commercial standing is part of the live access check, not a separate back-office process.
Resolve the billing state and re-run the entitlement check.The user is known, but the access policy has not been accepted for the current account.
Accept the active policy and retry the governed action.The workflow remains installed, but governance has paused execution for risk or review.
Resume only after operator review or updated policy conditions.Auth0 establishes the person or tenant boundary. `.agency` does not treat a bearer token as a replacement for identity.
Every request is checked against organization membership, service entitlement, contract standing, billing state, and policy acceptance.
Portal sign-in, managed bearer tokens, and hosted product credentials remain distinct so compromise or revocation can be handled deliberately.
Revocation, regeneration, anomaly review, and audit trails are part of the standing operating model, not an optional support add-on.
`.agency` issues one managed bearer token per authenticated user for approved hosts and background agents. The token is portable, but authorization remains conditional at request time through live entitlement and policy checks.
If compromise is suspected, CREATE SOMETHING can revoke or regenerate access immediately without waiting for a token expiry window.
Access is not determined by token validity alone. `.agency` can deny execution when contract status, billing standing, or required policy acceptance is not current. This keeps back-office reality tied to runtime behavior instead of leaving a governance gap between the agreement and the workflow.
For security inquiries, contact [email protected].