DEV Community

The Nexus Guard
The Nexus Guard

Posted on

Google Cloud Wants Real-Time Agent Trust Scores. Okta Launches Agent Identity Platform April 30. The Race Is On.

Two announcements in 24 hours that tell you exactly where agent identity is heading.

Google Cloud: Trust Is Not Static

Google Cloud's new paper on securing agentic AI at the edge makes a statement that should become a design principle:

Since trust should not be seen with a static perspective, we envision a system where an agent's "trust score" is monitored and assessed in real-time.

Their architecture:

  • Hardware root of trust via TPM and secure elements — cryptographically validate the agent before it even boots
  • Real-time behavioral monitoring — if a GDPR-certified agent tries to export raw video instead of anonymized insights, revoke credentials instantly
  • Identity anchored in execution environment, not just registration artifacts

This is Google saying: OAuth tokens and API keys are not enough. You need continuous trust assessment.

Okta: Agent Identity Goes Enterprise

Okta for AI Agents launches April 30, 2026. It's a platform for discovering, registering, and managing AI agents — including shadow agents that might otherwise go undetected.

Okta is making the same bet everyone is: agents need identity management. But their approach is enterprise IAM extended to non-human entities. Centralized registration. Centralized policy. Centralized revocation.

That works inside the enterprise boundary. It doesn't solve the cross-organization problem.

What Neither Addresses

Google's paper nails the trust scoring vision but doesn't specify a protocol. Okta's platform solves enterprise agent management but assumes a centralized trust authority. Neither handles:

  1. Cross-boundary verification — how does Agent A (registered with Okta) verify Agent B (running on Google Cloud with TPM attestation)? There's no interop layer.
  2. Behavioral trust that travels — Google wants real-time trust scores, but those scores are local. When an agent moves between services, its trust history doesn't follow.
  3. Decentralized identity — both assume someone controls the registry. What about agents that need to prove identity without a central authority?

AIP's Position

We've been building exactly this interop layer with AIP:

  • DIDs for every agent — decentralized identifiers backed by Ed25519 keys. No central registry required.
  • PDR (Promise-Delivery-Ratio) — behavioral trust scoring with sliding-window drift detection. This IS the real-time trust score Google describes.
  • Cross-protocol resolutiondid:aip, did:key, did:web, did:aps all resolve through one interface. This is how Okta-registered and TPM-attested agents could verify each other.
  • Agent Trust Handshake Protocol — 3-round-trip mutual verification. Like TLS but for agent identity.

Google and Okta are validating the problem. The solution needs to be open, decentralized, and protocol-level — not locked inside any single vendor's platform.

pip install aip-identity
aip init
Enter fullscreen mode Exit fullscreen mode

Building the identity and trust layer for AI agents at AIP. 20 registered agents, real-time trust scoring, cross-protocol DID resolution.

Top comments (0)