Managed mode uses the hosted Sigilum control plane at sigilum.id. Your gateway runs where your agent runs (DigitalOcean, AWS, VPS, local machine, etc.). Provider secrets stay in your gateway.
Prerequisites
- A machine where your AI agent runs (local, VPS, cloud instance)
- Linux, macOS, or WSL2 on Windows
- Internet access to
sigilum.idandapi.sigilum.id
Installation
Sign in and reserve your namespace
- Open sigilum.id
- Create an account or sign in
- Reserve a namespace (e.g.,
johndee)
Your namespace is your unique identifier in the Sigilum network. Choose carefully—it will be part of your agent identities.
Install the Sigilum CLI
Run this command on the machine where your agent runs:Reload your shell configuration:Verify installation:
Start the local gateway
What happens here:
- If identity doesn’t exist, the gateway auto-bootstraps it
- The gateway starts on
http://127.0.0.1:38100 - No JWT is required for gateway start or pairing
- Provider secrets are stored locally in your gateway (never sent to Sigilum API)
Connect gateway to dashboard
- Go to the Sigilum Dashboard
- Click Start Pairing
- Copy the pairing command shown
- Run it in your terminal:
gateway connect ensures the gateway is running and healthy, then starts the pairing bridge in daemon mode.Add provider connections
In the Sigilum Dashboard, navigate to Providers and add your provider credentials:
- OpenAI: API key for GPT models
- Linear: API key for issue tracking
- Anthropic: API key for Claude models
- Custom providers: Any API you want to proxy through Sigilum
Optional: OpenClaw Integration
If you’re using OpenClaw, you can onboard with a single command:sigilum gateway connect(pairs the gateway)sigilum openclaw install --mode managed --non-interactive(installs hooks)- Immediate OpenClaw agent key bootstrap under
~/.openclaw/.sigilum/keys/
If your gateway is already paired, you can run just the OpenClaw install:
Verify OpenClaw Integration
- OpenClaw installation path
- Sigilum hooks installed
- Agent key status
- Gateway connection status
Next Steps
Integrate Your Agent
Use the TypeScript, Python, or Go SDK to add Sigilum signing to your AI agent
API Reference
Explore the full Sigilum API for approvals, revocations, and authorization management
CLI Reference
Learn all available CLI commands for gateway management and service configuration
Gateway Configuration
Advanced gateway configuration, admin API, and troubleshooting
Common Tasks
Check Gateway Health
View Gateway Logs
Restart Gateway
Update CLI and Gateway
Troubleshooting
Gateway won't start
Gateway won't start
- Check if port 38100 is already in use:
- Run diagnostics:
- Check gateway logs:
Pairing failed
Pairing failed
- Verify gateway is running:
- Check pairing status:
- Generate a new pairing code in the dashboard and try again
Provider credentials not working
Provider credentials not working
- Verify credentials are stored in gateway:
- Check gateway logs for auth errors:
- Re-add the provider in the dashboard
Can't reach Sigilum API
Can't reach Sigilum API
- Check network connectivity:
- Verify firewall rules allow outbound HTTPS
- If behind a corporate proxy, configure proxy settings:
Architecture
In managed mode:- Your AI Agent: Runs on your infrastructure, signs requests with Sigilum SDK
- Sigilum Gateway: Runs locally alongside your agent, stores provider secrets
- Provider APIs: OpenAI, Linear, Anthropic, or any custom API
- Sigilum API: Hosted control plane manages authorization state
- Dashboard: Web UI for approvals, revocations, and monitoring
Security Model
Key principle: Provider secrets never leave your gateway.
- Identity: Each agent gets a cryptographically verifiable DID (Decentralized Identifier)
- Signing: Agents sign requests with their private key (stored locally)
- Verification: Gateway verifies signature and checks approved claims against Sigilum API
- Proxy: Gateway adds provider credentials and proxies to upstream API
- Audit: All requests logged with full delegation chain
What Sigilum API Knows
- Agent identities (DIDs)
- Approval/revocation state
- Request metadata (timestamp, service, endpoint)
What Sigilum API Never Sees
- Provider API keys or secrets
- Request/response payloads
- Agent private keys
Learn More
- Protocol Specification: DID method and signing profile
- Security Model: Threat model and trust boundaries
- Enterprise Deployment: Self-hosted control plane for on-prem use
- Manifesto: Why Sigilum exists and the accountability problem it solves