Software has always assumed a human at the other end of the login screen. You authenticate once, set a session, and that identity lives until logout.
But agentic software breaks that model.
AI agents don’t log in, hang around, and log out. They:
These are entirely new identity primitives. And they don’t fit into systems built around passwords, long sessions, and static app registrations.
When the Model Context Protocol (MCP) first started gaining traction, developers rushed to expose their products as MCP servers. But in practice, most of these servers ran locally, wired up for demos rather than production. The missing piece? Authentication.
Without a secure way to prove which agents should connect (And what data they should be allowed to touch), MCP servers weren’t ready for mainstream adoption. That’s why we built one of the first dedicated solutions for a drop-in authorization server: An external layer that handles authentication outside the MCP server itself. This design soon became part of the official MCP spec.
At the same time, developers building agents ran into a parallel wall. In a dev environment, an agent acting for a single user works fine. But move that into production — where hundreds of users expect those agents to take real actions in Gmail, Slack, or Salesforce — and the whole setup cracks. Tokens are hard-coded, consent flows don’t exist, and security becomes guesswork.
Those two realities shaped our roadmap. Today, we’re making it official:
Scalekit’s Auth Stack for AI Apps is generally available.
(And yes, we’ve also raised a $5.5M seed led by Together Fund and Z47 to keep shipping ahead of the curve.)
If you’re building an MCP server, the first blocker is always the same: How do you securely let agents in?
With MCP Auth, you don’t need to roll your own OAuth layer. Scalekit gives you a drop-in authorization server that:
Instead of shipping a local MCP demo that anyone can poke at, you can expose a production-ready endpoint that enforces exactly which agents get access, and under what conditions.
Building an agent that works for one user in dev is easy. Making it work for hundreds of users in production is where things break:
Agent Actions fixes that by giving your agents a turnkey execution layer:
The result: your Slack bot posts with the right user’s token, your CRM agent edits only the allowed fields, and your workflows don’t collapse under bespoke OAuth hacks.
Most B2B teams don’t just have agents. They have human users too. Scalekit’s auth stack is designed to handle both sides together:
You don’t need to juggle parallel systems. One stack covers all your identity needs.
This launch is only the start. Our $5.5M seed round — led by Together Fund and Z47 with support from Adam Frankl, Oliver Jay, Jagadeesh Kunda, and others — is a bet on a simple but radical idea: Authentication has to be reimagined for the agentic era. These investors backed us because they see the same shift we do: That agent identity is not a feature but a new foundation layer for software.
We’re putting that capital to work across the stack:
The meta goal: Make it possible for more agentic apps to move into production without worrying about security.