New Keycard for Code

Identity and Access for Agentic Software Engineering

Native integration for Claude Code, Cursor, Codex, and other coding agents. Keycard resolves identity first so tools, skills, memories, and credentials can be scoped to the work being done.

Software engineering is becoming agentic.

The most advanced autonomous workflows running in production today are writing code. Reading repositories, planning changes, retrieving context, calling tools, coordinating work, shipping software. These workflows touch shell, scripts, MCP tools, cloud APIs, and internal services on every run.

But these workflows ship on static secrets and borrowed credentials. Over-scoped environment variables copied across machines, tools, and sessions. Context without identity. Authority without a clear enforcement point.

We built Keycard for Code because that model breaks the moment software engineering becomes agentic. And these are the agents building every other automation in the org. The access patterns they inherit are the access patterns they spread.

Identity first.

Keycard for Code brings identity and access natively into Claude Code, Cursor, and Codex. For every agentic session, it forms a composite identity from the full execution context: the user behind the work, the device and workload in play, the resources being accessed, the task being carried forward. That identity becomes the basis for policy evaluation and delegated access issuance.

That evaluation is continuous. Identity in agentic systems is a live execution context, re-evaluated as work unfolds. Access can be issued or constrained per request, per task, every few minutes, or whenever risk and context change.

The result is a bounded session: a governable unit of work that carries identity, policy outcome, and delegated capabilities forward across the workflow. Tools, skills, memories, and credentials are revealed progressively as the work requires them, instead of being granted wholesale up front.

kc_sess_7f3a Active
12m 34s
Identity Resolved
User [email protected] Okta SSO
Device mbp-m4-001 mTLS cert
Agent claude-code workload ID
Task fix-rate-limit-bug Linear LIN-482
Continuous Evaluation
12:04:21 identity resolved
12:04:22 github.com/acme/api token issued read, write
12:07:15 scope change: task updated, credentials re-evaluated
12:09:33 aws s3 token issued read only
12:11:47 aws s3 delete denied policy: read-only task
12:12:01 session extended (active work detected)

Built on standards. Built below the protocol layer.

Under the hood, Keycard is standards-based. It uses authorization primitives like OAuth grants to issue delegated access, while abstracting over whichever agent protocol matters now or next. MCP will evolve. A2A will evolve. Something else will show up after that. Keycard bakes identity and access into the tools and agents you use and build, regardless of what protocol they speak.

Coding Agent Claude Code, Cursor, Codex
MCP A2A CLI
Keycard
1 Identity Resolution
2 Policy Evaluation
3 Credential Issuance
OAuth 2.1 SPIFFE mTLS
Scoped tokens
GitHub
AWS
Slack
Linear
Data flows directly: Agent to API
Keycard handles: identity + credential + audit

Centralized governance for every coding session.

For organizations, Keycard for Code creates centralized enablement, visibility, and control without turning every coding workflow into a ticketing system.

Policy can be configured centrally and enforced consistently across sessions. Resource relationships can be modeled explicitly. External context (from classification systems, runtime security tools, or SIEM risk signals) can be mapped into policy evaluation. When something changes, access can be pruned surgically from live sessions instead of relying on long-lived credentials, broad secret rotation, and hope.

Security and platform teams get governance and auditability. Developers get leverage.

Keycard Console
12 Active Sessions
847 Requests Today
96.2% Auto-approved
3 Denied
Session Agent Status Events
[email protected] claude-code Active 14
12:04 Allow github.com/acme/api repo:read, repo:write
12:06 Allow mcp:linear issues:read
12:09 Allow aws:s3 GetObject (deploys/)
12:11 Deny aws:s3 DeleteBucket (policy: read-only task scope)
12:13 Allow shell go test ./... (credentials injected in-memory)
[email protected] cursor Active 7
[email protected] codex Ended 31
Before .env
# Copied from shared 1Password vault
# Last rotated: "sometime in Q3"
AWS_ACCESS_KEY_ID=AKIA3E...7VXN
AWS_SECRET_ACCESS_KEY=wJalrX...2JkRE
GITHUB_TOKEN=ghp_x7Kd...mN4q
SLACK_BOT_TOKEN=xoxb-2918...f0c3
DATABASE_URL=postgres://admin:[email protected]
# Full admin. Every agent. Every session.
With Keycard keycard run
# Injected in-memory. Scoped to session.
# Expires in 15 minutes.
AWS_ACCESS_KEY_ID=kc_sts_a3f2..7x
AWS_SECRET_ACCESS_KEY=kc_sts_9e1c..4m
GITHUB_TOKEN=ghu_kc_sess_7f3a
SLACK_BOT_TOKEN=kc_delegated_c8
DATABASE_URL=postgres://kc_sara:[email protected]
# Scoped. Short-lived. Attributed. No file on disk.

Programmers are at the center of this shift.

In the teams we work with, programmers are the ones being asked to lead the transition to agentic software engineering. They're being given enormous leverage through coding agents, and that leverage shouldn't depend on copying secrets across environments, over-scoping credentials, or stitching together brittle access workflows that were already failing before agents showed up.

Keycard for Code connects traditional development workflows to autonomous software engineering. It honors the tools and interfaces developers already use while moving organizations toward delegated, continuously governed software workflows.

Get started.

keycard run wraps your coding agent and governs every execution path. Install the CLI, authenticate your first session, and see composite identity and scoped access working in your terminal.

Terminal
$ keycard run -- claude

 Authenticated as [email protected]
 .env mounted (3 secrets, scoped to session kc_sess_7f3a)
 mcp.json loaded (4 servers from catalog, 2 shadow servers blocked)
 Hooks verified (checksum match)

Claude Code v4.2.1
Session kc_sess_7f3a · governed by Keycard

> fix the rate limiter in api/middleware.go

  Reading api/middleware.go...
   github.com/acme/api token issued repo:read
  Planning changes...
  Writing api/middleware.go, api/middleware_test.go...
   github.com/acme/api token issued repo:write
  Running tests...
   shell: go test credentials injected in-memory
   aws:s3 DeleteBucket denied policy: read-only task scope
  All tests passing. PR ready.

Session ended. 4 tokens issued, 1 denied, 0 secrets on disk.

Identity has to be resolved first. Without it, there's nothing to anchor context, constraints, delegation, or trust to. With identity resolved as a live execution context, access becomes scoped, auditable, revocable, and adaptive as work progresses.

Early access is open.