.webp)
Software has always assumed a human at the other end of the login screen. You authenticate once, set a session, and that identity lives until logout.
But agentic software breaks that model.
AI agents don’t log in, hang around, and log out. They:
These are entirely new identity primitives. And they don’t fit into systems built around passwords, long sessions, and static app registrations.
When the Model Context Protocol (MCP) first started gaining traction, developers rushed to expose their products as MCP servers. But in practice, most of these servers ran locally, wired up for demos rather than production. The missing piece? Authentication.
Without a secure way to prove which agents should connect (And what data they should be allowed to touch), MCP servers weren’t ready for mainstream adoption. That’s why we built one of the first dedicated solutions for a drop-in authorization server: An external layer that handles authentication outside the MCP server itself. This design soon became part of the official MCP spec.
At the same time, developers building agents ran into a parallel wall. In a dev environment, an agent acting for a single user works fine. But move that into production — where hundreds of users expect those agents to take real actions in Gmail, Slack, or Salesforce — and the whole setup cracks. Tokens are hard-coded, consent flows don’t exist, and security becomes guesswork.
Those two realities shaped our roadmap. Today, we’re making it official:
Scalekit’s Auth Stack for AI Apps is generally available.
(And yes, we’ve also raised a $5.5M seed led by Together Fund and Z47 to keep shipping ahead of the curve.)
If you’re building an MCP server, the first blocker is always the same: How do you securely let agents in?
With MCP Auth, you don’t need to roll your own OAuth layer. Scalekit gives you a drop-in authorization server that:
Instead of shipping a local MCP demo that anyone can poke at, you can expose a production-ready endpoint that enforces exactly which agents get access, and under what conditions.
Building an agent that works for one user in dev is easy. Making it work for hundreds of users in production is where things break:
Agent Actions fixes that by giving your agents a turnkey execution layer:
The result: your Slack bot posts with the right user’s token, your CRM agent edits only the allowed fields, and your workflows don’t collapse under bespoke OAuth hacks.
Most B2B teams don’t just have agents. They have human users too. Scalekit’s auth stack is designed to handle both sides together:
You don’t need to juggle parallel systems. One stack covers all your identity needs.
This launch is only the start. Our $5.5M seed round — led by Together Fund and Z47 with support from Adam Frankl, Oliver Jay, Jagadeesh Kunda, and others — is a bet on a simple but radical idea: Authentication has to be reimagined for the agentic era. These investors backed us because they see the same shift we do: That agent identity is not a feature but a new foundation layer for software.
We’re putting that capital to work across the stack:
The meta goal: Make it possible for more agentic apps to move into production without worrying about security.
Agentic software breaks traditional session models because agents spin up dynamically per task rather than logging in as humans do. These entities require ephemeral identities that exist only for specific workflow lifetimes. Unlike static human accounts, agents need scoped, least privilege permissions and delegated consent frameworks. Scalekit addresses this by moving away from passwords and long lived sessions toward a foundation built for ephemeral, task based identity primitives that scale with agentic workloads.
Scalekit provides a drop in authorization server that implements OAuth 2.1 with dynamic client registration for MCP developers. Instead of hand rolling complex security layers, you can deploy an external auth layer that keeps your server logic clean. It issues short lived tokens tied to specific datasets or projects, ensuring that only authorized agents can connect. This transforms local demos into production ready endpoints by enforcing strict access conditions without increasing the maintenance burden on engineering teams.
Dynamic Client Registration allows AI agents to register themselves securely and receive unique credentials on the fly. In the agentic era, creating static application registrations for every ephemeral task is impossible to manage manually. By automating this process, Scalekit ensures that every agent interaction is uniquely identified and authenticated. This improves security posture by enabling granular revocation and auditability, allowing security leaders to track exactly which agent performed a specific action within the corporate environment.
Agent Actions provides a turnkey execution layer consisting of a secure token vault and a standardized tool calling interface. It abstracts the complexity of managing OAuth credentials for external apps like Salesforce or Slack. The system handles automatic token rotation and metadata aware actions, ensuring agents know which parameters and scopes are required. This approach prevents developers from hard coding sensitive credentials and ensures that agent workflows remain stable and secure as they interact with various third party productivity tools.
Scalekit is designed to provide a unified identity stack that manages both human and agentic authentication in one place. It supports enterprise requirements like SSO and SCIM alongside modern agentic primitives and machine to machine auth. By consolidating these systems, engineering managers avoid the operational overhead of running parallel identity infrastructures. This unified approach ensures consistent security policies, centralized audit logs, and simplified lifecycle management for every identity type, whether it belongs to a human or an agent.
Scalekit enforces least privilege access by issuing scoped, short lived tokens that are strictly tied to specific workflows or tasks. Unlike traditional service accounts with broad permissions, agent tokens are designed to expire once a task is completed. The platform uses policy driven revocation and granular scope controls to limit what data an agent can touch. This prevents lateral movement in the event of a compromise and ensures that agents only have the minimum necessary access to perform their designated functions.
Hard coding tokens creates significant security vulnerabilities, including credential leakage and a lack of auditability. Without a centralized management system, there is no safe way to refresh or revoke compromised credentials without shipping new code. This practice fails to meet enterprise security standards and makes it impossible to manage user consent at scale. Scalekit eliminates these risks by providing a secure token vault and automated rotation, ensuring that credentials never linger or exist in plain text within application environments.
Scalekit includes a dedicated consent orchestrator that manages approvals and revocations for agents acting on behalf of users. When an agent needs to access a user mailbox or chat, the platform handles the delegated authorization flow to ensure explicit permission is granted. This provides a transparent mechanism for users and administrators to monitor and control agent access. By standardizing consent, Scalekit allows developers to build trustworthy AI applications that comply with privacy regulations and corporate governance policies.
Using an external authorization layer decouples the security logic from the core functionality of the MCP server. This architectural choice keeps the server logic clean and easier to maintain while providing a robust defense against unauthorized access. It allows the authorization server to handle complex tasks like token validation, rate limiting, and dynamic registration independently. This design is now part of the official MCP specification, offering a scalable way to secure agent connections without forcing developers to reinvent security protocols for every new server.