Instant Token Revocation
One click. Any token. Globally killed in 40 milliseconds. No blast radius, no lingering access, no exceptions.
When a connection token is revoked, every AI client using that token loses access immediately. The revocation propagates across the entire edge network in under 40ms — there is no grace period, no cache TTL to wait for, and no way to continue using a revoked token.
This is not a scheduled deactivation. It is an instant, irreversible kill switch.
Why this matters now
AI agents are no longer simple prompt-response systems. They are autonomous programs that chain tool calls, maintain persistent sessions, and operate on behalf of humans. When an agent goes rogue — or when a token is compromised — you need to stop it instantly, not after a cache refresh:
Two levels of control
Vinkius Cloud provides two distinct kill switch mechanisms — one for individual tokens and one for entire server connections:
How it works
The entire sequence completes in under 40 milliseconds. There is no intermediate state where the token is "revoking" — it transitions from active to dead in a single atomic operation.
Token lifecycle
Every connection token in Vinkius Cloud follows a secure lifecycle from creation to revocation:
Token security model
Revocation vs. traditional approaches
Most identity systems were designed for human session management. AI agents require fundamentally different revocation semantics:
Emergency scenarios
The industry context
AI agent identity management is one of the most challenging problems in enterprise security. AI agents now outnumber human identities in many enterprise environments, each requiring access management, credential lifecycle handling, and — critically — revocation capabilities.
Traditional identity systems were built around human workflows. A user logs out of a web application. A session cookie expires. An admin disables an account in Active Directory. These workflows operate on a timeline of minutes to hours — acceptable when the identity is a human navigating a web interface.
AI agents operate on a different timeline. An AI agent executing tool calls can make hundreds of API requests per minute. If its token is compromised and revocation takes 5 minutes, the agent can execute thousands of unauthorized operations before access is cut. The OAuth community is developing Continuous Access Evaluation Profile (CAEP) to address this gap, but most systems still rely on JWT expiry windows.
Vinkius Cloud eliminates this gap entirely. Token revocation propagates globally in 40 milliseconds. Active SSE connections are force-terminated. The killing mechanism operates at the infrastructure layer — the agent cannot resist, negotiate, or delay the revocation. One click, and the agent is permanently disconnected.
Next steps
Frequently Asked Questions
How fast does token revocation propagate?
40 milliseconds globally. The moment you click Revoke, the HMAC hash is invalidated in the database, the edge cache is purged across all 300+ PoPs, active SSE connections are terminated, and the event is logged. There is no intermediate "revoking" state.
Can a revoked token be reinstated?
No. Revocation is permanent and irreversible. The only way to restore access is to create a new connection token. This design prevents accidental re-enablement of compromised credentials.
What happens to active AI sessions when a token is revoked?
All active SSE (Server-Sent Events) connections using the revoked token are force-terminated immediately. The AI client receives a disconnect event and any subsequent requests return 401 Unauthorized.
How is Vinkius token revocation different from JWT expiry?
Traditional JWT-based systems rely on token expiry for revocation — if a JWT has a 1-hour lifetime, a compromised token remains valid for up to 60 minutes. Vinkius uses HMAC-SHA256 validated on every request, so revocation takes effect in 40ms with no grace period.
Can I revoke all connections to a server at once?
Yes. The "Kill all connections" feature immediately terminates ALL active SSE connections for a server. Every connected AI client is forcibly disconnected. Use this for emergency situations when the entire server must be taken offline instantly.
Are revocation events logged?
Yes. Every revocation event is recorded in the immutable Audit Log with a timestamp, the actor who performed the revocation, and the affected token name. This provides a complete forensic trail for security investigations.