Persistent identity
AI agents need stable records, not temporary prompts or unowned app credentials.
AI Persona Passport for NodeRunner
AIPPort gives AI personas verifiable identity, ownership, policy bindings, deployment rights, audit history, and revocation status across the NodeRunner ecosystem.
Identify the persona. Govern the node. Prove the action.
AI Persona Passport
AIPP-9F27-ATLAS
Issuer
AIPPort Trust Authority
Owner
Enterprise Tenant 4821
Version
2.4.1
Trust Level
Enterprise Approved
Policy Scope
Legal / Finance / Internal Data
Deployment
Cloud + PrivateCloud + Edge
Revocation
Active
Verification Hash
sha256:8f17...e2a9
The problem
AI personas now access tools, data, workflows, customers, employees, infrastructure, and decision systems. Without identity, provenance, policy, and revocation, organizations cannot reliably know which AI is acting, what it is allowed to do, or whether it can be trusted.
AI agents need stable records, not temporary prompts or unowned app credentials.
Teams need creator, owner, model, prompt, capability, and license lineage they can verify.
Compliance teams need evidence, runtime checks, and the ability to suspend or revoke.
Solution
AIPPort defines identity, provenance, permissions, policy scope, deployment rights, version history, audit status, and revocation state.
Unknown persona, unverified prompt, unclear permissions, no audit chain, no deployment governance.
Verified identity, known owner, policy-bound scope, deployment approval, audit-ready record, revocation support.
NodeRunner ecosystem
NodeRunner governs trusted AI environments, policy enforcement, nodes, users, workflows, and auditability. AIPPort adds the persona identity layer, making every AI actor visible, verifiable, governable, and revocable.
AI Persona
AIPPort Passport Check
NodeRunner Policy Runtime
Approved / Restricted / Audit Event
AIPPort identifies the persona. NodeRunner governs the node. Together, they create a trusted operating environment for AI.
Managed by AIPPort: identity, issuer, owner, version, capability scope, policies, trust level, revocation.
Managed by NodeRunner: runtime environment, node identity, deployment location, enforcement, access control, observability.
Jointly governed: passport checks, policy runtime decisions, restrictions, approvals, and audit evidence.
Persona Passport
An AI Persona Passport is a structured, verifiable record that defines who an AI persona is, who controls it, what it can do, where it can operate, and whether it should be trusted.
{
"passport_id": "AIPP-9F27-ATLAS",
"persona_name": "Atlas Compliance Agent",
"persona_type": "enterprise_compliance_agent",
"issuer": "AIPPort Trust Authority",
"creator": "NodeRunner Labs",
"owner": "Enterprise Tenant 4821",
"version": "2.4.1",
"status": "verified",
"trust_level": "enterprise_approved",
"model_lineage": {
"base_model": "approved_model_reference",
"configuration_hash": "sha256:...",
"last_reviewed": "2026-05-16"
},
"prompt_lineage": {
"system_prompt_hash": "sha256:...",
"policy_prompt_hash": "sha256:...",
"version_history": [
"2.2.0",
"2.3.0",
"2.4.1"
]
},
"capabilities": [
"policy_analysis",
"document_review",
"risk_summary",
"workflow_recommendation"
],
"restricted_capabilities": [
"financial_execution",
"legal_final_decision",
"external_user_impersonation"
],
"policy_bindings": [
"enterprise_ai_policy_v4",
"data_retention_policy_v2",
"regulated_workflow_policy_v1"
],
"memory_permissions": {
"can_store_memory": true,
"can_export_memory": false,
"retention_window": "90_days"
},
"deployment_permissions": {
"cloud": true,
"private_cloud": true,
"edge": true,
"air_gapped": false
},
"audit": {
"last_attestation": "2026-05-16T14:30:00Z",
"last_policy_review": "2026-05-10T09:00:00Z",
"events_recorded": 1827
},
"license": {
"type": "enterprise_internal",
"transferable": false,
"expires": "2027-05-16"
},
"revocation": {
"status": "active",
"reason": null,
"revoked_at": null
}
}How it works
Create a passport record.
Attach identity, ownership, lineage, policies, permissions, and use cases.
Validate issuer, owner, version, scope, and trust status.
Permit approved personas in NodeRunner environments.
Track changes, usage, policy events, updates, and trust signals.
Suspend or revoke personas that expire, drift, violate policy, or lose authorization.
Is the passport valid?
Is the persona version approved?
Is the owner trusted?
Is the persona allowed in this environment?
Is it allowed to use this tool?
Has the persona been suspended or revoked?
Use cases
Large organizations can register internal AI assistants, compliance bots, sales agents, support agents, and automation personas with clear identity and policy control.
Finance, healthcare, legal, insurance, government, and critical infrastructure teams can prove which persona acted, under which policy, and with what authorization.
Marketplaces can distribute verified personas with passport-backed trust, licensing, provenance, and revocation.
Managed service providers can manage personas across client tenants while preserving ownership, tenant boundaries, and audit records.
NodeRunner edge and air-gapped environments can allow only approved AI personas to operate in sensitive deployments.
Agentic workflows can verify which personas may collaborate, delegate, access tools, or act on behalf of users.
Create Passport / Request Access
Register your AI persona with identity, ownership, lineage, policy, and deployment controls. Demo passport currently supports 3 approved deployment scopes.
About
AI personas are becoming operational participants in businesses, platforms, workflows, and digital ecosystems. They are no longer just chat windows. They make recommendations, take actions, access systems, interact with people, and influence decisions.
To create the passport layer for trusted AI personas.
A world where every AI persona can be identified, verified, governed, and trusted across secure digital environments.
Trust infrastructure starts with identity
Bring identity, policy, provenance, and trust to the AI actors operating across your organization.