Which ACI Should I Use?
Answer 3 quick questions to find the right ACI for your project
1. What are you building?
AI Agent / Autonomous Service
LLM-powered agents, microservices, background workers
IoT Device / Embedded System
Smart devices, sensors, edge computing
Mobile App
iOS, Android, React Native, Flutter
Web Application
Single-page apps, dashboards, platforms
← Back
2. What's your primary goal?
Replace API Keys
Eliminate key rotation, sprawl, revocation chaos
Secure Machine-to-Machine Communication
Encrypted, authenticated messages between services
Password-less Identity
Decentralized identity, threshold authentication
Secrets Management
Distribute keys, credentials, sensitive data
← Back
3. What's your constraint?
On-Premise Required
No cloud dependencies, air-gapped networks
Cloud OK
Can use hosted services and relays
Compliance-First
HIPAA, SOC 2, audit logs, key escrow
Speed-First
Low latency, high throughput, real-time
← Start Over
Recommended ACI
xLink (Agent-SDK)
️ 15 seconds to first message
Why xLink? Zero key management required. Cryptographic identity replaces API keys. Perfect for AI agents and microservices.
Quick Start:
const conn = await connect('payments-service');
await conn.value.agent.send({
to: recipientDid,
payload: { action: 'transfer', amount: 1000 },
scope: 'payments'
});
Read xLink White Paper →
← Start Over
Recommended ACI
xID (Identity-SDK)
️ 2 minutes to first auth
Why xID? Threshold-based password-less authentication. User controls identity with K-of-N shares. No passwords to forget or steal.
Quick Start:
const result = await xIDAuthenticate({
shares: [share1, share2], // 2-of-3
challenge: 'nonce-from-service',
serviceDid: 'did:key:z6Mk...'
});
Read xID White Paper →
← Start Over
Recommended ACI
xPass (Permission-SDK)
️ 5 minutes to first enforcement
Why xPass? Multi-party approval for sensitive operations. Threshold enforcement prevents single-point compromise.
Quick Start:
const result = await xPassEnforce({
connectionId: 'treasury-001',
threshold: 2,
operation: async () => transferFunds(500000)
});
Read xPass White Paper →
← Start Over
Recommended ACI
Full Control Suite
️ 15 minutes to complete setup
Why Full Control? On-premise deployment with complete sovereignty. No cloud dependencies. Air-gapped networks supported.
Recommended Stack:
- xLink: M2M identity and communication
- xGate: Zero-trust perimeter gateway
- xLock: Distributed secrets management
Read Deployment Guide →
← Start Over
Recommended ACI
Compliance Suite
️ 30 minutes to audit-ready
Why Compliance Suite? Built-in audit logging, key escrow, and compliance reporting. HIPAA, SOC 2, and PCI DSS ready.
Recommended Stack:
- xPass: Multi-party approval with audit trails
- xLock: Compliant secrets management
- xGhost: Tamper-evident execution logs
Read Compliance Guide →