Product Introduction
Definition: The Permit.io MCP Gateway is a zero-trust security proxy designed specifically for the Model Context Protocol (MCP). It functions as an infrastructure-level enforcement point that sits between AI agents (such as Claude, Cursor, or internal LLM applications) and MCP servers (data sources like Salesforce, GitHub, Slack, or internal databases). It is a policy-driven middleware that adds enterprise-grade identity and access management (IAM) to the MCP ecosystem without requiring modifications to the underlying server code.
Core Value Proposition: The Permit.io MCP Gateway exists to solve the "wormhole" problem of Agentic AI, where AI agents gain over-privileged, unmonitored access to sensitive SaaS tools and internal data. By providing a drop-in trust layer, it enables organizations to deploy AI agents with fine-grained authorization, real-time audit trails, and human-in-the-loop consent. It bridges the gap between the flexibility of MCP and the rigorous security requirements of the enterprise, utilizing "Zanzibar-style" relational authorization and Open Policy Agent (OPA) to ensure every agentic action is verified and governed.
Main Features
OAuth 2.1 & Identity Delegation: The gateway intercepts MCP requests to ensure every agent session is bound to a verified human identity. It integrates with existing Identity Providers (IdP) via OIDC and SAML, handling OAuth 2.1 flows, token exchange, and session refreshing automatically. This ensures that agents inherit the permissions of the user they are representing, preventing anonymous or "shadow" tool execution.
Zanzibar-style Fine-Grained Authorization: Leveraging Permit’s underlying authorization engine, the gateway supports Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and Relationship-Based Access Control (ReBAC). It uses a Google Zanzibar-inspired relationship graph to manage complex delegation chains, ensuring that an agent can only access specific tools or data objects (e.g., a specific Jira ticket or a particular S3 bucket) based on real-time policy evaluation.
Visual Consent Editor & Human-in-the-Loop: The platform includes a low-code visual editor for building white-labeled consent screens. Security teams can define "Trust Heuristics" that trigger a user approval prompt before an agent performs a high-risk action (e.g., deleting a lead in Salesforce or transferring funds). This provides a frontend-less way to implement human oversight into autonomous agent workflows.
Agent Fingerprinting & Drift Detection: Before exposing tools, the gateway performs an "identify_self" handshake. It creates a behavioral fingerprint of the agent and monitors for "prompt drift" or malicious injection. If an agent’s intent deviates from its authorized policy or historical behavior, the gateway can automatically throttle or block the request.
Real-Time Decision Logging & SIEM Integration: Every tool call, policy decision, and user consent is captured in a centralized audit trail. These logs provide full visibility into the "decision chain"—mapping the user, the agent, the specific tool called, and the OPA policy that allowed or denied the action. Data can be exported to SIEM platforms for compliance reporting and anomaly detection.
OPAL-Powered Policy Distribution: Using the Open Policy Administration Layer (OPAL), the gateway ensures that authorization policies are updated in real-time across the entire infrastructure. This hybrid architecture decouples the control plane from the data plane, allowing for sub-10ms policy decisions at the edge while maintaining centralized management.
Problems Solved
Lack of Fine-Grained Control in MCP: Standard MCP implementations are often binary (all-or-nothing access). The gateway solves this by providing "least privilege" enforcement at the tool and resource level.
Unregulated Agent Access (Shadow MCP): Developers often connect AI agents directly to production APIs. The gateway provides a centralized "Guardian Agent" layer that monitors and governs these connections, preventing data exfiltration and unauthorized tool usage.
Target Audience:
- CISO & Security Engineers: Seeking to mitigate the "Agentic Blast Radius" and ensure SOC 2/HIPAA compliance for AI initiatives.
- AI/LLM Platform Engineers: Needing a scalable way to manage authentication and authorization for multi-agent systems.
- DevOps/SRE: Looking for a no-code security proxy that integrates with existing Kubernetes or cloud environments.
- SaaS Product Managers: Wanting to provide secure MCP endpoints to their end customers with built-in multi-tenancy.
- Use Cases:
- Secure Internal Tooling: Allowing developers to use AI code assistants (like Cursor) with internal GitLab repositories while enforcing strict RBAC.
- Enterprise Customer Support Agents: Enabling agents to access Zendesk and Jira with explicit user consent for sensitive data modifications.
- Multi-Tenant SaaS MCP: Providing a secure way for external users to connect their agents to a company’s API via a governed MCP server.
Unique Advantages
Zero-Code Integration (Drop-in Proxy): Unlike SDK-based security solutions, the Permit MCP Gateway requires no changes to the agent or the MCP server code. Users simply swap the upstream MCP URL for the gateway-proxied URL, making it the fastest way to secure agentic workflows.
Unified Policy Engine: It leverages OPA (Open Policy Agent) and Rego, allowing security teams to write "Policy-as-Code" that works across all MCP servers simultaneously. This replaces fragmented, server-specific auth logic with a single source of truth.
Hybrid Enforcement Architecture: By separating the policy management (Permit Cloud) from the enforcement point (Local PDP/Gateway), it offers enterprise-grade security without the latency of traditional cloud-based authorization checks.
Identity-Agent Binding: Most security products treat agents as static service accounts. Permit treats them as dynamic delegates of human users, solving the complex problem of "Identity Delegation" in AI.
Frequently Asked Questions (FAQ)
What is the Permit.io MCP Gateway? The Permit.io MCP Gateway is a zero-trust security proxy designed to add authentication, fine-grained authorization (RBAC/ABAC/ReBAC), and audit logging to any Model Context Protocol (MCP) server without changing its code.
Does Permit MCP Gateway support OAuth and SSO? Yes. The gateway acts as an OAuth 2.1 proxy, allowing you to connect your existing Identity Providers (IdPs) like Okta, Auth0, or Azure AD. It ensures every agent action is tied to a verified human identity through OIDC/SSO.
How does it prevent prompt injection and unauthorized agent actions? The gateway enforces "Guardian Agent" policies at runtime. It inspects every tool call against OPA-based policies and can trigger consent screens or block actions that deviate from the user's authorized permissions or the agent's behavioral fingerprint.
Can I use Permit MCP Gateway with self-hosted MCP servers? Absolutely. The gateway can be deployed as a hosted service or on-prem within your VPC. It works with any MCP-compliant server, including those for Salesforce, GitHub, Slack, databases, and custom internal tools.
What is "Zanzibar-style" authorization in the context of AI agents? Zanzibar-style authorization (ReBAC) allows you to define permissions based on relationships. In the gateway, this means you can create complex rules such as "Agent X can edit Jira Ticket Y only if User Z (the delegator) is the assignee of that ticket."
