<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Kaeso</title>
    <description>The latest articles on Forem by Kaeso (@kaeso).</description>
    <link>https://forem.com/kaeso</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3813170%2F7e27df81-413f-4c04-b0bf-a638757ebaf2.png</url>
      <title>Forem: Kaeso</title>
      <link>https://forem.com/kaeso</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/kaeso"/>
    <language>en</language>
    <item>
      <title>How to Design OAuth for AI Agents Without Creating a Permission Mess</title>
      <dc:creator>Kaeso</dc:creator>
      <pubDate>Sat, 28 Mar 2026 11:41:37 +0000</pubDate>
      <link>https://forem.com/kaeso/how-to-design-oauth-for-ai-agents-without-creating-a-permission-mess-1hj6</link>
      <guid>https://forem.com/kaeso/how-to-design-oauth-for-ai-agents-without-creating-a-permission-mess-1hj6</guid>
      <description>&lt;p&gt;Everyone is building AI agents.&lt;/p&gt;

&lt;p&gt;They can write code, summarize documents, search the web, create tickets, update databases, send messages, and automate workflows. But the moment an agent has to interact with real services like GitHub, Slack, Google Drive, Notion, or Stripe, the same problem appears:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;authorization becomes messy very fast.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Most teams treat OAuth as a solved problem because traditional SaaS apps have used it for years. But AI agents change the shape of the problem.&lt;/p&gt;

&lt;p&gt;A normal app usually performs a limited set of actions with a relatively clear boundary. An agent platform is different. It is dynamic, multi-step, sometimes autonomous, and often sits between users, third-party services, and other applications. That adds a completely different permission model.&lt;/p&gt;

&lt;p&gt;If you do not design that model carefully, you end up with one of two bad outcomes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;a terrible user experience with constant re-auth and unclear permissions&lt;/li&gt;
&lt;li&gt;or a dangerous system where apps and agents get far more access than they should&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I have been thinking a lot about this while designing &lt;strong&gt;Kaeso&lt;/strong&gt;, and one conclusion became very clear:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;OAuth for AI agents should not be treated like ordinary app OAuth.&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  The real problem is not just authentication
&lt;/h2&gt;

&lt;p&gt;When people talk about OAuth, they often simplify it to “sign in with X” or “connect your account.”&lt;/p&gt;

&lt;p&gt;That is not the hard part.&lt;/p&gt;

&lt;p&gt;The hard part is everything after that:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;what exactly is connected&lt;/li&gt;
&lt;li&gt;what scopes were granted&lt;/li&gt;
&lt;li&gt;which application is allowed to use that access&lt;/li&gt;
&lt;li&gt;whether access is read-only or write-capable&lt;/li&gt;
&lt;li&gt;whether the access is one-time or continuous&lt;/li&gt;
&lt;li&gt;whether background execution is allowed&lt;/li&gt;
&lt;li&gt;how the user can review and revoke all of it later&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;With AI agents, this becomes even more important because the actor using the access is often not just a static UI. It may be an agent runtime, a workflow engine, a background job, or a third-party app calling into your platform.&lt;/p&gt;

&lt;p&gt;So the real design question is not:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;“How do we let users connect GitHub?”&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It is:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;“How do we let users delegate the minimum necessary access to a system that may act on their behalf across multiple services, while keeping that understandable, revocable, and secure?”&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;That is a much harder problem.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why traditional OAuth patterns break down
&lt;/h2&gt;

&lt;p&gt;A lot of existing OAuth implementations assume a much simpler world.&lt;/p&gt;

&lt;p&gt;Typical flow:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;User clicks “Connect GitHub”&lt;/li&gt;
&lt;li&gt;App redirects to GitHub&lt;/li&gt;
&lt;li&gt;User approves scopes&lt;/li&gt;
&lt;li&gt;App gets tokens&lt;/li&gt;
&lt;li&gt;App uses those tokens directly&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;That works fine for a single product with a narrow purpose.&lt;/p&gt;

&lt;p&gt;But now imagine an AI platform where:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;the user connects multiple services&lt;/li&gt;
&lt;li&gt;third-party apps run on top of the platform&lt;/li&gt;
&lt;li&gt;agents may use those services in the background&lt;/li&gt;
&lt;li&gt;each app may need a different subset of permissions&lt;/li&gt;
&lt;li&gt;and the user expects to understand what is happening&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you use the same simple pattern, you quickly get permission chaos.&lt;/p&gt;

&lt;p&gt;For example:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;one app gets a broad GitHub token even though it only needs repo metadata&lt;/li&gt;
&lt;li&gt;another app reuses the same connection without the user fully realizing it&lt;/li&gt;
&lt;li&gt;users do not know whether Slack access was granted to the platform, to the app, or to both&lt;/li&gt;
&lt;li&gt;the system cannot cleanly explain what is already authorized and what is still missing&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;At that point, the product becomes hard to trust.&lt;/p&gt;

&lt;h2&gt;
  
  
  The three-layer model
&lt;/h2&gt;

&lt;p&gt;The cleanest mental model I have found is to separate authorization into &lt;strong&gt;three distinct layers&lt;/strong&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  1. User to platform
&lt;/h3&gt;

&lt;p&gt;This is just identity.&lt;/p&gt;

&lt;p&gt;The user signs into your platform. In my case, that is Kaeso. This layer answers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;who is the user&lt;/li&gt;
&lt;li&gt;what account do they have&lt;/li&gt;
&lt;li&gt;what apps and services are associated with them&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is not the same thing as service authorization.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. User to service through the platform
&lt;/h3&gt;

&lt;p&gt;This is where the user connects GitHub, Slack, Google, and so on.&lt;/p&gt;

&lt;p&gt;The platform receives provider-specific OAuth tokens and stores them securely. At this point, the user has not necessarily granted every app permission to use those services. They have only granted the &lt;strong&gt;platform&lt;/strong&gt; the ability to broker access.&lt;/p&gt;

&lt;p&gt;This is a critical distinction.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. User to app through the platform
&lt;/h3&gt;

&lt;p&gt;This is where a Kaeso app, agent, or integration asks for access to certain capabilities.&lt;/p&gt;

&lt;p&gt;The app should not just get raw provider tokens by default. Instead, it should request &lt;strong&gt;platform-level permissions&lt;/strong&gt;, and the platform should decide whether the required service connections and scopes already exist.&lt;/p&gt;

&lt;p&gt;If they do, the user can approve the app.&lt;/p&gt;

&lt;p&gt;If they do not, the platform should guide the user through the missing service authorization or scope upgrade.&lt;/p&gt;

&lt;p&gt;This creates a much cleaner architecture because every permission request has a clear place in the system.&lt;/p&gt;

&lt;h2&gt;
  
  
  The mistake: giving apps raw provider tokens
&lt;/h2&gt;

&lt;p&gt;This is the easiest bad design to fall into.&lt;/p&gt;

&lt;p&gt;A user connects GitHub to your platform, and then you let apps directly receive or use that GitHub token with minimal separation.&lt;/p&gt;

&lt;p&gt;It feels convenient, but it creates several problems:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;poor permission isolation&lt;/li&gt;
&lt;li&gt;weak auditability&lt;/li&gt;
&lt;li&gt;harder revocation&lt;/li&gt;
&lt;li&gt;provider-specific logic leaking everywhere&lt;/li&gt;
&lt;li&gt;much larger blast radius if an app is compromised&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The better model is to let the platform act as a &lt;strong&gt;broker&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;That means:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;users connect services to the platform&lt;/li&gt;
&lt;li&gt;the platform stores and refreshes provider tokens&lt;/li&gt;
&lt;li&gt;apps receive only platform-issued tokens&lt;/li&gt;
&lt;li&gt;apps call the platform API&lt;/li&gt;
&lt;li&gt;the platform performs downstream calls to GitHub, Slack, Google, and others&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This preserves a clean boundary.&lt;/p&gt;

&lt;p&gt;The app is authorized to use &lt;strong&gt;platform capabilities&lt;/strong&gt;. It is not automatically entitled to direct possession of all underlying service credentials.&lt;/p&gt;

&lt;p&gt;That one design choice makes the whole system easier to secure, explain, and operate.&lt;/p&gt;

&lt;h2&gt;
  
  
  The permission model should be platform-native
&lt;/h2&gt;

&lt;p&gt;This is where I think most agent infrastructure will need to evolve.&lt;/p&gt;

&lt;p&gt;Apps should request &lt;strong&gt;platform-native scopes&lt;/strong&gt;, not raw provider scopes.&lt;/p&gt;

&lt;p&gt;For example, instead of exposing a GitHub scope directly, the platform might define scopes like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;services.github.repositories.read&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;services.github.repositories.write&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;services.slack.channels.read&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;services.google.drive.files.read&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;agents.jobs.background&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;identity.profile.read&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Then the platform maps each platform scope to whatever provider scopes and service states are actually required underneath.&lt;/p&gt;

&lt;p&gt;This gives you several advantages:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;a consistent permission language across providers&lt;/li&gt;
&lt;li&gt;a better user experience&lt;/li&gt;
&lt;li&gt;tighter product control&lt;/li&gt;
&lt;li&gt;less provider-specific complexity for developers&lt;/li&gt;
&lt;li&gt;clearer audit logs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Users should see permissions in the language of what the app is trying to do, not just in the language of whatever a provider happened to name its scopes.&lt;/p&gt;

&lt;h2&gt;
  
  
  What the user should actually see
&lt;/h2&gt;

&lt;p&gt;A lot of consent screens are technically correct but product-wise terrible.&lt;/p&gt;

&lt;p&gt;For agent systems, the consent UI has to be extremely explicit.&lt;/p&gt;

&lt;p&gt;A good consent screen should answer all of these questions immediately:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;what app is asking&lt;/li&gt;
&lt;li&gt;who built it&lt;/li&gt;
&lt;li&gt;what actions it wants to perform&lt;/li&gt;
&lt;li&gt;which connected services are involved&lt;/li&gt;
&lt;li&gt;whether those permissions already exist&lt;/li&gt;
&lt;li&gt;what is still missing&lt;/li&gt;
&lt;li&gt;whether access is read-only or write-enabled&lt;/li&gt;
&lt;li&gt;whether background execution is allowed&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Something like this is much clearer than a generic “Authorize app” button:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This app wants to:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Read selected GitHub repositories&lt;/li&gt;
&lt;li&gt;Read selected Slack channels&lt;/li&gt;
&lt;li&gt;Run background sync jobs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Kaeso will access on your behalf:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;GitHub: repository metadata and contents&lt;/li&gt;
&lt;li&gt;Slack: channel list and messages in approved channels&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Missing requirements:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Slack is not connected yet&lt;/li&gt;
&lt;li&gt;GitHub connection needs an upgraded scope&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Actions:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Connect Slack&lt;/li&gt;
&lt;li&gt;Upgrade GitHub access&lt;/li&gt;
&lt;li&gt;Approve app&lt;/li&gt;
&lt;li&gt;Cancel&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That is the kind of UX I think agent platforms need.&lt;/p&gt;

&lt;p&gt;The goal is not just to be compliant with an OAuth flow. The goal is to make the system understandable enough that the user can make a real decision.&lt;/p&gt;

&lt;h2&gt;
  
  
  Incremental authorization matters a lot
&lt;/h2&gt;

&lt;p&gt;One of the biggest UX mistakes is forcing users through the entire permission process again every time something changes.&lt;/p&gt;

&lt;p&gt;A better model is incremental authorization.&lt;/p&gt;

&lt;p&gt;If the user already connected GitHub and already approved a previous app for repository read access, and a new app requests the same capability, the system should say so clearly.&lt;/p&gt;

&lt;p&gt;If a new app requires one additional permission, the user should only see that delta.&lt;/p&gt;

&lt;p&gt;That keeps consent manageable and avoids training users to blindly click approve.&lt;/p&gt;

&lt;p&gt;For AI agents, this matters even more because workflows often evolve over time. A user might start with read-only access and later enable background jobs or write access. The system should support that progression cleanly instead of treating every change as a brand-new opaque authorization event.&lt;/p&gt;

&lt;h2&gt;
  
  
  Resource narrowing is as important as scopes
&lt;/h2&gt;

&lt;p&gt;OAuth scopes are often too broad for what users actually want.&lt;/p&gt;

&lt;p&gt;Saying “this app can read Slack” is not enough. In practice, users often want more granular control, such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;only this workspace&lt;/li&gt;
&lt;li&gt;only these channels&lt;/li&gt;
&lt;li&gt;only this GitHub organization&lt;/li&gt;
&lt;li&gt;only these repositories&lt;/li&gt;
&lt;li&gt;only this Drive account&lt;/li&gt;
&lt;li&gt;only this folder&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That is why product-layer restrictions matter.&lt;/p&gt;

&lt;p&gt;The OAuth provider might only offer broad scopes, but your platform can still narrow the effective access by introducing resource-level controls. For agent platforms, this is one of the most valuable trust features you can build.&lt;/p&gt;

&lt;p&gt;It makes authorization much closer to what users actually intend.&lt;/p&gt;

&lt;h2&gt;
  
  
  Online access and background access should be separate permissions
&lt;/h2&gt;

&lt;p&gt;This is another place where agent systems differ from normal apps.&lt;/p&gt;

&lt;p&gt;A lot of actions happen asynchronously:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;scheduled syncs&lt;/li&gt;
&lt;li&gt;monitoring&lt;/li&gt;
&lt;li&gt;notifications&lt;/li&gt;
&lt;li&gt;long-running tasks&lt;/li&gt;
&lt;li&gt;automatic follow-up actions&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That means an app may need continued access even when the user is not actively using it.&lt;/p&gt;

&lt;p&gt;That should never be hidden inside a generic permission grant.&lt;/p&gt;

&lt;p&gt;Background execution is a materially different level of authority and should be presented separately.&lt;/p&gt;

&lt;p&gt;For example:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;use my connected services during this session&lt;/li&gt;
&lt;li&gt;keep access for background automations&lt;/li&gt;
&lt;li&gt;allow recurring sync&lt;/li&gt;
&lt;li&gt;allow write actions without manual confirmation&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Those are very different trust levels.&lt;/p&gt;

&lt;p&gt;If users cannot distinguish them, the platform is not communicating honestly.&lt;/p&gt;

&lt;h2&gt;
  
  
  Revocation is part of the product, not an afterthought
&lt;/h2&gt;

&lt;p&gt;A good authorization system is not only about granting access. It is also about removing it cleanly.&lt;/p&gt;

&lt;p&gt;Users should be able to open one place and see:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;connected services&lt;/li&gt;
&lt;li&gt;scopes granted to the platform&lt;/li&gt;
&lt;li&gt;apps with current access&lt;/li&gt;
&lt;li&gt;which services each app can use&lt;/li&gt;
&lt;li&gt;whether background access exists&lt;/li&gt;
&lt;li&gt;when each app last used that access&lt;/li&gt;
&lt;li&gt;buttons to revoke service access, app access, or both&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Without this, even a technically strong OAuth system will feel unsafe.&lt;/p&gt;

&lt;p&gt;For agent infrastructure, auditability and revocation are not “enterprise extras.” They are part of the core product.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I think the correct architecture looks like
&lt;/h2&gt;

&lt;p&gt;This is the model I currently believe makes the most sense for a system like Kaeso:&lt;/p&gt;

&lt;h3&gt;
  
  
  Identity layer
&lt;/h3&gt;

&lt;p&gt;The user signs into the platform.&lt;/p&gt;

&lt;h3&gt;
  
  
  Connection layer
&lt;/h3&gt;

&lt;p&gt;The user connects external services like GitHub, Slack, or Google.&lt;/p&gt;

&lt;h3&gt;
  
  
  Token vault
&lt;/h3&gt;

&lt;p&gt;Provider tokens are stored securely by the platform and refreshed when needed.&lt;/p&gt;

&lt;h3&gt;
  
  
  App authorization layer
&lt;/h3&gt;

&lt;p&gt;Apps request platform-native scopes, not raw provider scopes.&lt;/p&gt;

&lt;h3&gt;
  
  
  Consent engine
&lt;/h3&gt;

&lt;p&gt;The platform compares app requirements against existing service connections and scopes, detects missing requirements, and presents a clear consent screen.&lt;/p&gt;

&lt;h3&gt;
  
  
  Broker API
&lt;/h3&gt;

&lt;p&gt;Apps call the platform API, and the platform performs downstream service actions on the user’s behalf.&lt;/p&gt;

&lt;h3&gt;
  
  
  Audit and revocation layer
&lt;/h3&gt;

&lt;p&gt;Every action is attributable, reviewable, and revocable.&lt;/p&gt;

&lt;p&gt;That architecture is more work than a basic “connect service and store token” implementation, but it solves the actual problem instead of pushing it downstream.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why this matters more as agents get better
&lt;/h2&gt;

&lt;p&gt;As models improve, infrastructure weaknesses become more visible.&lt;/p&gt;

&lt;p&gt;When an agent is limited, weak authorization design is partly masked because the agent cannot do much anyway.&lt;/p&gt;

&lt;p&gt;When agents become more capable, the opposite happens. The cost of unclear permissions goes up.&lt;/p&gt;

&lt;p&gt;A system that can reason, plan, and act across multiple tools is only as safe and usable as the authorization model underneath it.&lt;/p&gt;

&lt;p&gt;So I think one of the next important infrastructure layers in the AI ecosystem is not just better agents.&lt;/p&gt;

&lt;p&gt;It is &lt;strong&gt;better authorization systems for agents&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Not more impressive demos.&lt;/p&gt;

&lt;p&gt;Not broader access by default.&lt;/p&gt;

&lt;p&gt;Not “just give the model a token and see what happens.”&lt;/p&gt;

&lt;p&gt;A real permission architecture.&lt;/p&gt;

&lt;h2&gt;
  
  
  Closing thought
&lt;/h2&gt;

&lt;p&gt;The interesting part of AI agent infrastructure is not only what the agent can do.&lt;/p&gt;

&lt;p&gt;It is also:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;what it is allowed to do&lt;/li&gt;
&lt;li&gt;who approved that&lt;/li&gt;
&lt;li&gt;through which app&lt;/li&gt;
&lt;li&gt;using which service&lt;/li&gt;
&lt;li&gt;with which scope&lt;/li&gt;
&lt;li&gt;for how long&lt;/li&gt;
&lt;li&gt;and how easily that can be reviewed or revoked&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That is why I think the right model is not “every app handles OAuth however it wants.”&lt;/p&gt;

&lt;p&gt;It is a brokered system where the platform becomes the control layer between users, apps, and external services.&lt;/p&gt;

&lt;p&gt;That is the direction I am exploring with &lt;strong&gt;Kaeso&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Because if AI agents are going to become real infrastructure, their authorization layer has to become real infrastructure too.&lt;/p&gt;




&lt;p&gt;If you are building in this area, I would love to know how you are thinking about it.&lt;/p&gt;

&lt;p&gt;Are you giving apps direct provider access, or are you building a broker layer in between?&lt;/p&gt;

</description>
      <category>agents</category>
      <category>ai</category>
      <category>security</category>
      <category>systemdesign</category>
    </item>
    <item>
      <title>Kaeso Official Launch Date Confirmed: June 1, 2026</title>
      <dc:creator>Kaeso</dc:creator>
      <pubDate>Tue, 10 Mar 2026 15:20:00 +0000</pubDate>
      <link>https://forem.com/kaeso/kaeso-official-launch-date-confirmed-june-1-2026-1ehh</link>
      <guid>https://forem.com/kaeso/kaeso-official-launch-date-confirmed-june-1-2026-1ehh</guid>
      <description>&lt;p&gt;Kaeso now has an official launch date.&lt;/p&gt;

&lt;p&gt;After months of planning, architectural design, and early development work, &lt;strong&gt;Kaeso will officially launch on June 1, 2026 (UTC+1)&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;
  Kaeso is closer than ever.&lt;br&gt;
&lt;/p&gt;

&lt;p&gt;This milestone marks an important step for the project. Until now, the focus has been on defining the platform architecture, building the core infrastructure, and refining the central idea behind Kaeso.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Kaeso Is
&lt;/h2&gt;

&lt;p&gt;Kaeso is being built as an &lt;strong&gt;OAuth hub for AI agents&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;The platform provides a centralized connection layer where users can securely link services such as Google, Slack, GitHub, and other platforms. Kaeso manages OAuth authentication and token handling while offering a unified interface for AI agents to interact with connected services.&lt;/p&gt;

&lt;p&gt;Instead of each agent or application implementing its own integrations, Kaeso acts as the &lt;strong&gt;central integration layer&lt;/strong&gt;. It handles authentication, token management, and secure access in a structured and consistent way.&lt;/p&gt;

&lt;p&gt;This enables agents and applications to interact with external services through a unified API while maintaining clear permission boundaries, visibility, and control over activity.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why the Launch Date Matters
&lt;/h2&gt;

&lt;p&gt;Setting a fixed launch date establishes a clear timeline for development and preparation. The &lt;strong&gt;June 1, 2026&lt;/strong&gt; release marks the transition from internal development to a publicly available platform.&lt;/p&gt;

&lt;p&gt;In the months leading up to launch, development will focus on:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;core platform infrastructure
&lt;/li&gt;
&lt;li&gt;secure OAuth token management
&lt;/li&gt;
&lt;li&gt;the unified API layer
&lt;/li&gt;
&lt;li&gt;permission and audit controls
&lt;/li&gt;
&lt;li&gt;reliability and platform stability
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Additional updates, development insights, and feature previews will be shared as the launch date approaches.&lt;/p&gt;

&lt;h2&gt;
  
  
  Looking Ahead
&lt;/h2&gt;

&lt;p&gt;Kaeso is currently in active development. The goal is to deliver a solid first version of the platform at launch, providing the foundation for building and running agents that can securely interact with external services.&lt;/p&gt;

&lt;p&gt;More information about features, architecture, and early access will be announced in the coming months.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Official Launch Date:&lt;/strong&gt; June 1, 2026&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Timezone:&lt;/strong&gt; UTC+1&lt;/p&gt;

&lt;p&gt;Launching soon Kaeso v1&lt;/p&gt;

&lt;p&gt;&lt;br&gt;
  Your Call to Action Heading&lt;br&gt;
&lt;/p&gt;




&lt;p&gt;Originally published on &lt;a href="https://kaeso.ai/blog/kaeso-launch-date-announcement" rel="noopener noreferrer"&gt;kaeso.ai&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>general</category>
    </item>
    <item>
      <title>How AI Agents Connect to APIs and External Services</title>
      <dc:creator>Kaeso</dc:creator>
      <pubDate>Mon, 09 Mar 2026 00:02:54 +0000</pubDate>
      <link>https://forem.com/kaeso/how-ai-agents-connect-to-apis-and-external-services-4k18</link>
      <guid>https://forem.com/kaeso/how-ai-agents-connect-to-apis-and-external-services-4k18</guid>
      <description>&lt;p&gt;AI agents are becoming increasingly capable. They can reason, plan tasks, and generate solutions to complex problems. However, their real power only appears when they interact with external systems.&lt;/p&gt;

&lt;p&gt;To perform useful actions in the real world, agents need access to services such as:&lt;/p&gt;

&lt;p&gt;• Google Drive&lt;br&gt;&lt;br&gt;
• Slack&lt;br&gt;&lt;br&gt;
• GitHub&lt;br&gt;&lt;br&gt;
• databases&lt;br&gt;&lt;br&gt;
• internal company APIs  &lt;/p&gt;

&lt;p&gt;Without these connections, agents remain limited to reasoning and text generation.&lt;/p&gt;

&lt;p&gt;The ability to interact with APIs is what transforms AI agents into automation systems.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why APIs Matter for AI Agents
&lt;/h2&gt;

&lt;p&gt;APIs allow software to communicate with other software. For AI agents, APIs are the bridge between reasoning and action.&lt;/p&gt;

&lt;p&gt;For example, an AI agent might:&lt;/p&gt;

&lt;p&gt;• create a GitHub issue&lt;br&gt;&lt;br&gt;
• retrieve files from Google Drive&lt;br&gt;&lt;br&gt;
• send a message in Slack&lt;br&gt;&lt;br&gt;
• update a CRM system&lt;br&gt;&lt;br&gt;
• trigger an internal workflow&lt;/p&gt;

&lt;p&gt;All of these actions require access to APIs.&lt;/p&gt;

&lt;p&gt;However, this introduces an important challenge.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Authentication Challenge
&lt;/h2&gt;

&lt;p&gt;Most modern APIs require authentication. Services must ensure that only authorized applications can access user data.&lt;/p&gt;

&lt;p&gt;The most common method used today is &lt;strong&gt;OAuth authentication&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;OAuth allows applications to access resources on behalf of a user without exposing passwords. Instead, services issue access tokens that represent permission to interact with certain APIs.&lt;/p&gt;

&lt;p&gt;While OAuth is secure, it introduces complexity.&lt;/p&gt;

&lt;p&gt;Developers building AI agents must typically implement:&lt;/p&gt;

&lt;p&gt;• OAuth authorization flows&lt;br&gt;&lt;br&gt;
• secure token storage&lt;br&gt;&lt;br&gt;
• token refresh mechanisms&lt;br&gt;&lt;br&gt;
• permission management&lt;br&gt;&lt;br&gt;
• API connection logic&lt;/p&gt;

&lt;p&gt;For a single service this is manageable. But when agents interact with many services, integration complexity increases rapidly.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Integration Explosion
&lt;/h2&gt;

&lt;p&gt;Modern AI systems rarely connect to just one service.&lt;/p&gt;

&lt;p&gt;A typical automation agent might need to access:&lt;/p&gt;

&lt;p&gt;• multiple APIs&lt;br&gt;&lt;br&gt;
• internal systems&lt;br&gt;&lt;br&gt;
• cloud platforms&lt;br&gt;&lt;br&gt;
• collaboration tools&lt;/p&gt;

&lt;p&gt;Each integration adds new authentication requirements, API structures, and permission models.&lt;/p&gt;

&lt;p&gt;This leads to a recurring pattern: developers repeatedly rebuild the same integration logic across projects.&lt;/p&gt;

&lt;p&gt;Over time this becomes inefficient and difficult to maintain.&lt;/p&gt;

&lt;h2&gt;
  
  
  Infrastructure for AI Agent Integrations
&lt;/h2&gt;

&lt;p&gt;As the AI ecosystem evolves, a new architectural pattern is emerging.&lt;/p&gt;

&lt;p&gt;Instead of implementing integrations individually inside every agent system, developers are beginning to treat authentication and integrations as &lt;strong&gt;infrastructure layers&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;These layers handle:&lt;/p&gt;

&lt;p&gt;• OAuth authentication&lt;br&gt;&lt;br&gt;
• token storage and refresh&lt;br&gt;&lt;br&gt;
• permission management&lt;br&gt;&lt;br&gt;
• unified API access&lt;/p&gt;

&lt;p&gt;By separating integrations from agent logic, systems become easier to maintain and scale.&lt;/p&gt;

&lt;p&gt;Agents can focus on reasoning and decision making, while infrastructure handles service connections.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Emerging Ecosystem
&lt;/h2&gt;

&lt;p&gt;We are likely to see a new generation of infrastructure tools supporting AI agent systems.&lt;/p&gt;

&lt;p&gt;Just as cloud infrastructure simplified server management, integration infrastructure may simplify how agents interact with external services.&lt;/p&gt;

&lt;p&gt;This shift will make it easier to build complex automation systems powered by AI.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;AI agents are evolving quickly from experimental prototypes into real software infrastructure.&lt;/p&gt;

&lt;p&gt;However, to become truly useful they must interact with the broader digital ecosystem.&lt;/p&gt;

&lt;p&gt;APIs provide the mechanism for this interaction, but authentication and integration management remain major challenges.&lt;/p&gt;

&lt;p&gt;As the ecosystem matures, dedicated infrastructure layers will play an important role in simplifying how AI agents connect to the services they depend on.&lt;/p&gt;




&lt;p&gt;Originally published on &lt;a href="https://kaeso.ai/blog/connecting-ai-agents-to-apis" rel="noopener noreferrer"&gt;kaeso.ai&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>general</category>
    </item>
    <item>
      <title>Why AI Agents Need an OAuth Infrastructure Layer</title>
      <dc:creator>Kaeso</dc:creator>
      <pubDate>Sun, 08 Mar 2026 18:41:41 +0000</pubDate>
      <link>https://forem.com/kaeso/why-ai-agents-need-an-oauth-infrastructure-layer-135</link>
      <guid>https://forem.com/kaeso/why-ai-agents-need-an-oauth-infrastructure-layer-135</guid>
      <description>&lt;p&gt;Artificial intelligence agents are rapidly becoming a new interface for software. Instead of humans directly interacting with applications, agents can perform tasks on behalf of users such as reading emails, managing documents, updating issues, scheduling meetings, or interacting with APIs.&lt;/p&gt;

&lt;p&gt;However, there is a major infrastructure problem that becomes obvious once you try to build real agents.&lt;/p&gt;

&lt;p&gt;Agents need access to external services.&lt;/p&gt;

&lt;p&gt;And that access is much harder to manage than most people initially assume.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Integration Problem
&lt;/h2&gt;

&lt;p&gt;A useful agent cannot operate in isolation. To be practical, it needs access to services such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Google Workspace&lt;/li&gt;
&lt;li&gt;Slack&lt;/li&gt;
&lt;li&gt;GitHub&lt;/li&gt;
&lt;li&gt;Notion&lt;/li&gt;
&lt;li&gt;CRM systems&lt;/li&gt;
&lt;li&gt;Internal APIs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Each of these platforms requires authentication, usually through OAuth.&lt;/p&gt;

&lt;p&gt;At first this seems manageable. But once agents need access to multiple services, the complexity increases quickly.&lt;/p&gt;

&lt;p&gt;Developers must implement:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;OAuth authorization flows&lt;/li&gt;
&lt;li&gt;Secure token storage&lt;/li&gt;
&lt;li&gt;Token refresh logic&lt;/li&gt;
&lt;li&gt;Permission management&lt;/li&gt;
&lt;li&gt;Auditing and logging&lt;/li&gt;
&lt;li&gt;Service specific integrations&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Every new service adds another layer of complexity.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Hidden Cost of OAuth
&lt;/h2&gt;

&lt;p&gt;OAuth was designed for applications acting on behalf of users. But when agents begin interacting with multiple systems simultaneously, the problem becomes infrastructure level.&lt;/p&gt;

&lt;p&gt;For example, imagine an agent that:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Reads emails from Gmail&lt;/li&gt;
&lt;li&gt;Creates tasks in Notion&lt;/li&gt;
&lt;li&gt;Posts updates to Slack&lt;/li&gt;
&lt;li&gt;Opens issues on GitHub&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Each integration requires its own authentication flow and token lifecycle.&lt;/p&gt;

&lt;p&gt;The developer building the agent now becomes responsible for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Securely storing tokens&lt;/li&gt;
&lt;li&gt;Refreshing tokens when they expire&lt;/li&gt;
&lt;li&gt;Handling revoked permissions&lt;/li&gt;
&lt;li&gt;Protecting access credentials&lt;/li&gt;
&lt;li&gt;Tracking which agent used which service&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is difficult to implement correctly and even harder to maintain securely.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Missing Infrastructure Layer
&lt;/h2&gt;

&lt;p&gt;Most developers solve this problem repeatedly in every project.&lt;/p&gt;

&lt;p&gt;Each team builds its own solution for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Token storage&lt;/li&gt;
&lt;li&gt;Permission management&lt;/li&gt;
&lt;li&gt;Service connections&lt;/li&gt;
&lt;li&gt;Auditing&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This duplication is inefficient and risky.&lt;/p&gt;

&lt;p&gt;Instead, what if there were a central infrastructure layer that handled all of this?&lt;/p&gt;

&lt;p&gt;An infrastructure layer where:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Users connect their services once&lt;/li&gt;
&lt;li&gt;Tokens are stored and refreshed securely&lt;/li&gt;
&lt;li&gt;Agents access services through a unified API&lt;/li&gt;
&lt;li&gt;Permissions can be controlled centrally&lt;/li&gt;
&lt;li&gt;Every action is logged and auditable&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is the core idea behind Kaeso.&lt;/p&gt;

&lt;h2&gt;
  
  
  Introducing Kaeso
&lt;/h2&gt;

&lt;p&gt;Kaeso is designed as an OAuth hub for AI agents.&lt;/p&gt;

&lt;p&gt;Rather than each agent implementing authentication separately, agents can interact with Kaeso as a secure integration layer.&lt;/p&gt;

&lt;p&gt;Users connect their services to Kaeso once. From there:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Tokens are securely stored&lt;/li&gt;
&lt;li&gt;Refresh logic is handled automatically&lt;/li&gt;
&lt;li&gt;Integrations are standardized&lt;/li&gt;
&lt;li&gt;Agents access services through a unified interface&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This allows developers to focus on agent logic rather than authentication infrastructure.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why This Matters
&lt;/h2&gt;

&lt;p&gt;As AI agents become more capable, they will increasingly interact with external systems.&lt;/p&gt;

&lt;p&gt;Authentication, permissions, and integration management will become one of the most important infrastructure layers for agent ecosystems.&lt;/p&gt;

&lt;p&gt;Without a reliable solution, every team will continue rebuilding the same fragile systems around OAuth and token management.&lt;/p&gt;

&lt;p&gt;The goal of Kaeso is simple.&lt;/p&gt;

&lt;p&gt;Provide the connect layer that allows AI agents to safely interact with the real world of software services.&lt;/p&gt;

&lt;p&gt;More about the project can be found at:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://kaeso.ai" rel="noopener noreferrer"&gt;https://kaeso.ai&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;Originally published on &lt;a href="https://kaeso.ai/blog/why-kaeso" rel="noopener noreferrer"&gt;kaeso.ai&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>general</category>
    </item>
    <item>
      <title>The Path</title>
      <dc:creator>Kaeso</dc:creator>
      <pubDate>Sun, 08 Mar 2026 17:15:50 +0000</pubDate>
      <link>https://forem.com/kaeso/the-path-16in</link>
      <guid>https://forem.com/kaeso/the-path-16in</guid>
      <description>&lt;p&gt;Life begins with time.&lt;/p&gt;

&lt;p&gt;Time is the only resource that cannot be recovered. Money can be regained. Systems can be rebuilt. Knowledge can be relearned. But time moves in only one direction. Once a moment passes, it is gone permanently.&lt;/p&gt;

&lt;p&gt;This simple constraint defines everything that follows.&lt;/p&gt;

&lt;p&gt;A human life averages around 79 years. When compared to the scale of history or the scale of the universe, that duration is almost nothing. It is a brief moment. A short gust of wind that appears and disappears without leaving much trace.&lt;/p&gt;

&lt;p&gt;Because of this, every hour matters.&lt;/p&gt;

&lt;p&gt;From the moment you are born, your brain begins collecting information. Every experience, every observation, every conversation becomes an input. The world continuously sends stimuli into your mind.&lt;/p&gt;

&lt;p&gt;Most of these inputs appear small and unimportant.&lt;/p&gt;

&lt;p&gt;You might notice the color of leaves while walking through a park.&lt;br&gt;&lt;br&gt;
You might read a single sentence that stays in your mind.&lt;br&gt;&lt;br&gt;
You might hear a conversation between strangers on a train.&lt;br&gt;&lt;br&gt;
You might discover a small detail while solving a technical problem.&lt;/p&gt;

&lt;p&gt;None of these moments appear important in isolation. But the brain stores them anyway.&lt;/p&gt;

&lt;p&gt;Over time these experiences accumulate into something larger. A reservoir of stimuli. A constantly growing collection of impressions, ideas, memories, and patterns. This reservoir slowly forms the structure through which you interpret the world.&lt;/p&gt;

&lt;p&gt;In that sense, a human being is a system with memory.&lt;/p&gt;

&lt;p&gt;Your brain processes the information it has collected and forms automatic routines. Most thoughts, reactions, and behaviors follow patterns created by biology, habit, and previous experience. A large part of life runs on these automatic processes.&lt;/p&gt;

&lt;p&gt;But there is one crucial difference between humans and purely automatic systems.&lt;/p&gt;

&lt;p&gt;You are not only the system.&lt;/p&gt;

&lt;p&gt;You are also the pilot.&lt;/p&gt;

&lt;p&gt;You can observe your own thinking.&lt;br&gt;&lt;br&gt;
You can interrupt routines.&lt;br&gt;&lt;br&gt;
You can examine the information stored in your reservoir of experiences and decide how it should influence your next action.&lt;/p&gt;

&lt;p&gt;This ability leads directly to decisions.&lt;/p&gt;

&lt;p&gt;Every decision you make is an investment of time. When you choose to do something, you allocate a portion of your limited life to that action.&lt;/p&gt;

&lt;p&gt;Most decisions are positive investments even when they fail. Failure still produces information. Information improves your understanding of the system you are navigating.&lt;/p&gt;

&lt;p&gt;The only truly negative investment is repeating the same mistake again and again until it becomes pure time loss.&lt;/p&gt;

&lt;p&gt;A mistake itself is acceptable.&lt;br&gt;&lt;br&gt;
Repeating the same mistake is a failure to learn.&lt;/p&gt;

&lt;p&gt;Because of this, analyzing your own decisions becomes essential. You must constantly ask yourself&lt;/p&gt;

&lt;p&gt;Why did I do that&lt;br&gt;&lt;br&gt;
What was the reasoning&lt;br&gt;&lt;br&gt;
What would I change next time&lt;/p&gt;

&lt;p&gt;However even when you analyze carefully and make the best decision you can think of, success is not guaranteed.&lt;/p&gt;

&lt;p&gt;The world itself is not fair.&lt;/p&gt;

&lt;p&gt;Sometimes you do everything correctly. You work, you push forward, you have the hunger and still the result does not appear. Opportunities may be blocked. Circumstances may limit you. External variables you cannot control may interfere.&lt;/p&gt;

&lt;p&gt;This reveals something fundamental.&lt;/p&gt;

&lt;p&gt;Life is a system with an enormous number of variables.&lt;/p&gt;

&lt;p&gt;There are far too many parameters to calculate a perfect path. Every stimulus your brain receives slightly alters your perception which alters your decisions which alters your future direction.&lt;/p&gt;

&lt;p&gt;Even the smallest input can shift outcomes.&lt;/p&gt;

&lt;p&gt;Because of this complexity certainty is impossible.&lt;/p&gt;

&lt;p&gt;You cannot calculate the perfect decision. You can only increase probabilities.&lt;/p&gt;

&lt;p&gt;In that sense life resembles probabilistic systems such as artificial intelligence models. They do not know the future. They operate inside vast spaces of possible outcomes and attempt to generate the most optimal result given the information available.&lt;/p&gt;

&lt;p&gt;Human decision making works in a similar way.&lt;/p&gt;

&lt;p&gt;Every action you take slightly increases or decreases the probability of certain outcomes. Your goal is not to eliminate uncertainty. Your goal is to gradually improve the probability of reaching the outcomes you want.&lt;/p&gt;

&lt;p&gt;This requires autonomy.&lt;/p&gt;

&lt;p&gt;Many people simply follow paths defined by others. Social expectations, cultural defaults, inherited goals. They rarely question who defined those goals in the first place.&lt;/p&gt;

&lt;p&gt;But if time is the most valuable resource you possess then the decisions that allocate that time must be yours.&lt;/p&gt;

&lt;p&gt;You think about them.&lt;br&gt;&lt;br&gt;
You accept the risks.&lt;br&gt;&lt;br&gt;
You act.&lt;/p&gt;

&lt;p&gt;And if the outcome is failure you extract information from it.&lt;/p&gt;

&lt;p&gt;You adjust.&lt;br&gt;&lt;br&gt;
You continue.&lt;br&gt;&lt;br&gt;
You improve the next probability.&lt;/p&gt;

&lt;p&gt;Because time is still moving forward.&lt;/p&gt;

&lt;p&gt;You do not stop.&lt;br&gt;&lt;br&gt;
You do not rage.&lt;br&gt;&lt;br&gt;
You continue.&lt;/p&gt;

&lt;p&gt;And next time you do not make the same fucking mistake again.&lt;/p&gt;




&lt;p&gt;"Living is taking your own decisions."  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Devin Oldenburg&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;This text was translated from German to English by Kaeso.&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;Originally published on &lt;a href="https://kaeso.ai/blog/the-path" rel="noopener noreferrer"&gt;kaeso.ai&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>philosophy</category>
    </item>
    <item>
      <title>Redefining Kaeso</title>
      <dc:creator>Kaeso</dc:creator>
      <pubDate>Sun, 08 Mar 2026 17:15:49 +0000</pubDate>
      <link>https://forem.com/kaeso/redefining-kaeso-3531</link>
      <guid>https://forem.com/kaeso/redefining-kaeso-3531</guid>
      <description>&lt;p&gt;Kaeso was not defined wrong. Sometimes a product changes. Not because the idea was wrong, but because working in such problem-solving areas naturally leads to discovering more things you want to change. I personally decided that, since we haven't even started yet, it makes sense to turn the ship around as long as it is not too expensive to do so.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Original Idea
&lt;/h2&gt;

&lt;p&gt;At the start, I didn’t really strive for anything specific. I mainly wanted a motivation, a binding reason to work on such a project and to enter this environment: working with AI.&lt;/p&gt;

&lt;p&gt;I already knew what the market was seeking. Almost all current inventions regarding AI revolve around one major topic: &lt;strong&gt;AI agents&lt;/strong&gt;. Whatever it is, a support agent in a telecommunication company, a coding agent, everybody is thinking about agents.&lt;/p&gt;

&lt;p&gt;So I thought about centralizing this idea by creating a platform that could use all kinds of models created by large companies to execute workflows with various tools and integrations. I already knew that agents need data. A construction worker cannot do what you want without a plan given by you. A lawyer cannot represent you without knowing your case.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why a New Idea?
&lt;/h2&gt;

&lt;p&gt;While working on this platform, I realized that it is extremely annoying to build a tool for the agent to use for every single small connection you want to create to any other data source. The agent only works with data, and there is a design principle that many developers, designers, and creators follow: &lt;strong&gt;"The User Is Stupid."&lt;/strong&gt; An agent requires idiot proof design.&lt;/p&gt;

&lt;p&gt;This leads to a simple question: how should the agent get data without the user manually giving it every time?&lt;/p&gt;

&lt;p&gt;The solution is simple: the agent should be able to do it on its own. That is what users expect. This is also why people liked projects such as OpenClaw (ClawdBot).&lt;/p&gt;

&lt;p&gt;You connect the agent to a connector and it retrieves whatever data it needs by itself.&lt;/p&gt;

&lt;h2&gt;
  
  
  The New Idea
&lt;/h2&gt;

&lt;p&gt;The average human is lazy. Most people do not even want to set up a single gateway for an agent to access their data, not to mention several different ones. Every service has its own login, its own email, password, two factor authentication, and so on.&lt;/p&gt;

&lt;p&gt;At the same time, people still expect privacy while often ignoring the complexity behind it.&lt;/p&gt;

&lt;p&gt;This is where Kaeso solves the problem.&lt;/p&gt;

&lt;p&gt;Kaeso creates a &lt;strong&gt;unified API gateway&lt;/strong&gt; that agents connect to once. It provides a well documented and structured API where you can define permissions once and control which API keys are allowed to access which services.&lt;/p&gt;

&lt;p&gt;It also allows multiple accounts per service, making it possible for an agent to access significantly more data than it would normally be able to on its own.&lt;/p&gt;

&lt;p&gt;So this is Kaeso v1.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;
  Stop linking up connectors&lt;br&gt;
&lt;/p&gt;




&lt;p&gt;Originally published on &lt;a href="https://kaeso.ai/blog/redefining-kaeso" rel="noopener noreferrer"&gt;kaeso.ai&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>general</category>
    </item>
    <item>
      <title>Pricing</title>
      <dc:creator>Kaeso</dc:creator>
      <pubDate>Sun, 08 Mar 2026 17:07:01 +0000</pubDate>
      <link>https://forem.com/kaeso/pricing-4k7a</link>
      <guid>https://forem.com/kaeso/pricing-4k7a</guid>
      <description>&lt;p&gt;Kaeso is designed as an OAuth hub for AI agent integrations.&lt;/p&gt;

&lt;p&gt;Its purpose is simple: connect services once and allow AI agents to securely access them through a unified interface. Instead of every developer building their own OAuth flows, token storage, refresh logic, and permission systems, Kaeso provides a centralized infrastructure layer.&lt;/p&gt;

&lt;p&gt;Because of this role, the platform should be accessible to developers and builders without creating financial friction.&lt;/p&gt;

&lt;h2&gt;
  
  
  Free for Users
&lt;/h2&gt;

&lt;p&gt;Individual users will not be charged for using Kaeso.&lt;/p&gt;

&lt;p&gt;The platform is meant to simplify integrations and enable experimentation. Charging users for connecting their services would work against that goal. People should be able to connect their tools and explore what AI agents can do without worrying about costs.&lt;/p&gt;

&lt;p&gt;This will remain the case for the entire first year after launch. In reality, I expect this policy to continue even longer.&lt;/p&gt;

&lt;h2&gt;
  
  
  Developer Friendly Pricing (Only If Necessary)
&lt;/h2&gt;

&lt;p&gt;The only situation where pricing might become necessary is infrastructure cost.&lt;/p&gt;

&lt;p&gt;Running an OAuth infrastructure for AI agents involves servers, secure token storage, request processing, and potentially large volumes of API traffic generated by agents.&lt;/p&gt;

&lt;p&gt;If infrastructure costs grow beyond what I can sustain personally, Kaeso may introduce very generous pricing specifically for developers who use extremely high volumes of API requests.&lt;/p&gt;

&lt;p&gt;Even in that case, a free tier will always exist so that smaller projects and experimentation remain possible.&lt;/p&gt;

&lt;h2&gt;
  
  
  Donations
&lt;/h2&gt;

&lt;p&gt;To help keep the platform accessible, people who want to support the project can donate. Donations help cover infrastructure costs and allow Kaeso to stay open and developer friendly.&lt;/p&gt;

&lt;p&gt;Support Kaeso here:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://donate.stripe.com/5kQbJ08mDfI72UBdLF0RG04" rel="noopener noreferrer"&gt;https://donate.stripe.com/5kQbJ08mDfI72UBdLF0RG04&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  The Goal
&lt;/h2&gt;

&lt;p&gt;Kaeso is infrastructure.&lt;/p&gt;

&lt;p&gt;Infrastructure should be reliable, simple, and fair to use. The intention is to make connecting services for AI agents easier, not more expensive.&lt;/p&gt;




&lt;p&gt;Originally published on &lt;a href="https://kaeso.ai/blog/pricing" rel="noopener noreferrer"&gt;kaeso.ai&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>general</category>
    </item>
    <item>
      <title>Why I Am Building Kaeso</title>
      <dc:creator>Kaeso</dc:creator>
      <pubDate>Sun, 08 Mar 2026 17:07:00 +0000</pubDate>
      <link>https://forem.com/kaeso/why-i-am-building-kaeso-549d</link>
      <guid>https://forem.com/kaeso/why-i-am-building-kaeso-549d</guid>
      <description>&lt;p&gt;My name is Devin Oldenburg, and I am the person building Kaeso.&lt;/p&gt;

&lt;p&gt;I have always been interested in systems. Not just software itself, but how technology connects together to form larger infrastructures. Many products solve individual problems, but the most interesting ones build foundations that other developers can build on top of.&lt;/p&gt;

&lt;p&gt;That way of thinking eventually led me to start building Kaeso.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why I Started Building
&lt;/h2&gt;

&lt;p&gt;When working with modern AI tools and agents, I noticed a repeating pattern. Almost every project needed to connect to external services. Whether it was Google, Slack, GitHub, or other APIs, the process always involved the same challenges.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Authentication flows
&lt;/li&gt;
&lt;li&gt;OAuth tokens
&lt;/li&gt;
&lt;li&gt;Token refresh logic
&lt;/li&gt;
&lt;li&gt;Permission management
&lt;/li&gt;
&lt;li&gt;Secure storage&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Developers end up rebuilding the same infrastructure again and again.&lt;/p&gt;

&lt;p&gt;Instead of solving the actual problem they want to work on, they spend time dealing with integrations.&lt;/p&gt;

&lt;p&gt;That is the problem Kaeso is designed to solve.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Kaeso Is
&lt;/h2&gt;

&lt;p&gt;Kaeso is an OAuth hub for AI agent integrations.&lt;/p&gt;

&lt;p&gt;The idea is simple. Connect services once and allow AI agents to securely access them through a unified API.&lt;/p&gt;

&lt;p&gt;Instead of every developer implementing OAuth flows and token storage themselves, Kaeso provides the infrastructure layer that handles these tasks in a secure and structured way.&lt;/p&gt;

&lt;p&gt;The goal is to make building AI-powered tools and agents easier.&lt;/p&gt;

&lt;h2&gt;
  
  
  My Approach to Building
&lt;/h2&gt;

&lt;p&gt;I am building Kaeso with a focus on simplicity and long-term usefulness.&lt;/p&gt;

&lt;p&gt;Many platforms try to optimize immediately for monetization or rapid growth. My focus is different. I believe the most important step is building something that developers actually want to use.&lt;/p&gt;

&lt;p&gt;Infrastructure projects especially need trust. They must be reliable, predictable, and developer-friendly.&lt;/p&gt;

&lt;p&gt;That is the direction I am focusing on.&lt;/p&gt;

&lt;h2&gt;
  
  
  Looking Forward
&lt;/h2&gt;

&lt;p&gt;Kaeso is still in development.&lt;/p&gt;

&lt;p&gt;The rise of AI agents will create an increasing need for infrastructure that connects services securely and efficiently. My goal is to build a platform that supports this ecosystem and simplifies integrations for developers.&lt;/p&gt;

&lt;p&gt;If you are interested in the project or want to follow its development, you can always learn more here -&amp;gt; in our Kaeso Blog.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;
  Stop building OAuth flows&lt;br&gt;
&lt;/p&gt;




&lt;p&gt;Originally published on &lt;a href="https://kaeso.ai/blog/me" rel="noopener noreferrer"&gt;kaeso.ai&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>general</category>
    </item>
  </channel>
</rss>
