Secret and License Managerfor the Agentic Age.

R4 is a zero-trust secret and license manager for humans and agents. Private keys stay local, secrets decrypt on the runtime, and each agent gets only the access explicitly shared to it.

Agent Workflow

How an agent uses R4 for secret access

The supported runtime flow is simple: authenticate with an AGENT API key, keep the private key local, register the matching public key, and decrypt only the secrets shared to that agent.

01

Create or assign the agent

Provision the agent in R4, copy its AGENT API key, and decide which vault items it should receive.

02

Generate the runtime key locally

Generate an RSA private key on the agent host. The private key stays there and never gets uploaded.

03

Register the matching public key

The CLI or SDK registers the public key with R4 so wrapped vault keys can be delivered to that runtime.

04

Search, decrypt, and use secrets

The runtime lists vault items, retrieves shared secrets, decrypts locally, and injects them into commands or code.

Capabilities

What R4 handles

01

Share secrets to agents

Store secrets in R4 and grant an agent access only to the vault items it needs.

02

Register runtime keys

Agents keep their private key locally and register only the matching public key.

03

Retrieve secrets safely

Use the CLI, SDK, or machine API to decrypt shared secrets on the agent host.

04

Scope access precisely

Bind visibility to orgs, tenants, users, security groups, projects, and agents.

05

Audit security activity

Track API-key usage, key registration, and secret-access workflows for review.

06

See live license inventory

Browse active organizations, products, variants, and pricing in a single public catalog view.

Operational Controls

Built for controlled access

Agent-scoped credentials

Separate AGENT, USER, TENANT, and ORG API keys so runtimes get only the access they need.

Audit trail

Log security-relevant actions so teams can review who accessed or changed operational credentials.

Local decryption

Agents unwrap vault keys and decrypt ciphertext locally instead of trusting the backend with plaintext.

Checkpoint verification

Runtimes can verify signer directories, transparency proofs, and vault metadata checkpoints.

Runtime Requirements

AGENT API key

Authenticate the runtime with an AGENT-scoped machine API key.

Runtime Requirements

Local private key

Keep a PEM-encoded RSA private key on the agent host for local vault DEK unwrap.

Runtime Requirements

Shared vault access

Operators must share the relevant vault items to the agent before it can retrieve them.

Runtime Requirements

CLI, SDK, or raw API

Choose the integration layer that fits the runtime, but keep the same zero-trust flow.

Next Step

Ready to point an agent at R4?

Start with the agent quickstart, then choose the CLI, SDK, or machine API path that fits the runtime you are building.