Agents can take action
They are no longer only generating answers. They are initiating real steps in business workflows, often without a visible user session.
§ 02 · LANDSCAPE · MARKET SHIFT
AI agents are changing where action begins, how quickly it moves, and how much depends on getting approval right. That shifts the market from verifying access to governing authority.
The shift
Software no longer only suggests — it acts. That flips authorization from a login moment into a per-action question that has to hold up across the business.
They are no longer only generating answers. They are initiating real steps in business workflows, often without a visible user session.
It must be clear what the user allowed the agent to do and when that permission applies — before and after the fact.
People should be able to use AI help without handing away unlimited access to their identity — or handing it away forever.
Forces
Authorization no longer happens only inside obvious user sessions. It can be triggered by software acting with delegated authority.
Delegated abuse, account misuse, and synthetic behavior become harder to reason about when automation enters the loop.
Product, operations, risk, compliance, and partners all need to understand why a sensitive action was allowed.
Legacy pattern
Traditional digital journeys assume the user is always directly steering the experience and that a generic approval event is enough.
Next pattern
Sensitive actions require a clearer relationship between the request, the user's authority, and the confidence an organization can place in the result.
First adopters
Payments, account changes, and regulated onboarding require stronger control over agent-initiated action.
Slots into your KYC/KYB stack; does not replace it.
Automated purchasing, verification, and seller trust flows require clearer human authority.
High-value bookings and account changes need confidence that the right person genuinely approved them.
Delegated workflows demand a governance model that holds up under operational and legal review.
MLRO, CISO, and fraud teams can defend each decision — the delegation credential, the attestation token, and the hash-chained receipt are artefacts their existing frameworks already read against.
Interop
The gateway issues and verifies credentials in the shapes these stacks already consume, so an organization can adopt Know Your Agent without throwing away its existing wallet strategy.
SD-JWT VC presentations via OIDC4VP line up with the European Digital Identity wallet flows defined by the ARF.
Both platforms are converging on the W3C Digital Credentials API plus OpenID4VP — the same shape Paphwey already speaks.
State-issued mDLs follow ISO/IEC 18013-5 mdoc. The issuer_method taxonomy reserves mdoc_iso18013_5 so presentations carry the right provenance.
Paphwey plans to integrate with every government-issued Digital Identity Wallet as each programme reaches general availability, so customers can onboard citizens through the wallet their jurisdiction has mandated.
Two topologies
Whose device holds the wallet, and whose keypair the agent uses, can shift a lot between industries. Paphwey's topology absorbs both — the cryptographic chain from user to agent to relying party stays identical; only the actors wearing each role change.
Consumer pattern
Enterprise pattern
Why Paphwey