Designing a CLI That Doesn't Get in Your Way
Design principles for building command-line tools that minimize friction through smart defaults, persistent config, and dual usage modes for humans and automation.
by Jacob Valentic
READ MORETechnical insights, updates, and deep dives into authorization
Design principles for building command-line tools that minimize friction through smart defaults, persistent config, and dual usage modes for humans and automation.
by Jacob Valentic
READ MOREReplace static API keys with cryptographically secure, auto-expiring identity tokens that provide a seamless upgrade path to full authorization.
by Jacob Valentic
READ MORELearn how to use Hessra's identity tokens to create secure, hierarchical identities for AI agents and sub-agents with cryptographic delegation.
by Jacob Valentic
READ MOREHow traditional tokens create ambient authority problems and why separating identity from authorization is the key to secure machine-to-machine communication.
by Jacob Valentic
READ MOREExploring three conceptual approaches to implementing Zero Trust: simulated solutions, shrinking perimeters, and request-scoped security.
by Jacob Valentic
READ MOREThe internet broke your network the moment you connected it. Zero Trust is the overdue fix.
by Jacob Valentic
READ MOREAuthorization built for machines with offline-verifiable tokens and deep stack coverage.
by Jacob Valentic
READ MORE