Appearance
Authentication & Access Model
Forge Pool uses a role-scoped token model aligned with the Planetary Kernel execution architecture.
Authentication is separated by authority, not combined into one overloaded token type.
There are three token classes:
- Project API Tokens
- User Tokens
- Node Tokens
Project API Tokens
Project API Tokens are the public execution credentials used to call the API.
Used for:
POST /api/v0/ops/execute- project-scoped execution
- workload submission through Web Core
Format:
http
Authorization: Bearer fpak_XXXXXXXXXXXXXXXXProperties:
- bound to a specific project
- validated by Web Core
- associated with billing and quota context
- required for all public distributed execution calls
These tokens represent execution authority, not human identity.
User Tokens
User Tokens represent an authenticated human identity in Web Core.
Used for:
- dashboard access
- project management
- API token generation
- node management
- billing and organization actions
These tokens:
- represent a user session or account identity
- do not directly execute workloads
- are not the public compute token format
Node Tokens
Node Tokens are used by Forge Pool agents and runtime infrastructure.
Used for:
- node registration
- hub connectivity
- shard execution trust
- result submission into runtime flows
These tokens:
- bind a physical or virtual node to an organization or runtime context
- are separate from public API credentials
- participate in execution trust and verification boundaries
Why the Token Model is Separated
Forge Pool separates user identity, project execution authority, and node trust so the runtime remains clear and defensible.
This prevents dangerous scope overlap such as:
- a user session acting like a compute token
- a project token impersonating node infrastructure
- a node token acting like a dashboard identity
The result is cleaner security and clearer runtime discipline.
Public Execution Flow
text
User -> Web Core Project -> Project API Token -> Execute API -> Hub -> AgentsTypical flow:
- A user creates a project.
- A Project API Token is generated.
- The client sends a canonical execution request.
- Web Core authenticates and authorizes the request.
- Hub executes it through the Kernel runtime.
- Agents perform shard-level work using separate runtime trust.
Rotation and Revocation
Project API Tokens can be revoked and regenerated from Web Core.
Node Tokens can be invalidated to remove compromised or retired agents.
User tokens follow the identity/session model of the authenticated dashboard layer.
